|
|
|
|
LEADER |
01000naa a22002652 4500 |
001 |
NLM153468335 |
003 |
DE-627 |
005 |
20231223064058.0 |
007 |
tu |
008 |
231223s2005 xx ||||| 00| ||eng c |
028 |
5 |
2 |
|a pubmed24n0512.xml
|
035 |
|
|
|a (DE-627)NLM153468335
|
035 |
|
|
|a (NLM)15688567
|
040 |
|
|
|a DE-627
|b ger
|c DE-627
|e rakwb
|
041 |
|
|
|a eng
|
100 |
1 |
|
|a Ramamoorthi, Ravi
|e verfasserin
|4 aut
|
245 |
1 |
2 |
|a A fourier theory for cast shadows
|
264 |
|
1 |
|c 2005
|
336 |
|
|
|a Text
|b txt
|2 rdacontent
|
337 |
|
|
|a ohne Hilfsmittel zu benutzen
|b n
|2 rdamedia
|
338 |
|
|
|a Band
|b nc
|2 rdacarrier
|
500 |
|
|
|a Date Completed 08.03.2005
|
500 |
|
|
|a Date Revised 10.12.2019
|
500 |
|
|
|a published: Print
|
500 |
|
|
|a Citation Status MEDLINE
|
520 |
|
|
|a Cast shadows can be significant in many computer vision applications, such as lighting-insensitive recognition and surface reconstruction. Nevertheless, most algorithms neglect them, primarily because they involve nonlocal interactions in nonconvex regions, making formal analysis difficult. However, many real instances map closely to canonical configurations like a wall, a V-groove type structure, or a pitted surface. In particular, we experiment with 3D textures like moss, gravel, and a kitchen sponge, whose surfaces include canonical configurations like V-grooves. This paper takes a first step toward a formal analysis of cast shadows, showing theoretically that many configurations can be mathematically analyzed using convolutions and Fourier basis functions. Our analysis exposes the mathematical convolution structure of cast shadows and shows strong connections to recent signal-processing frameworks for reflection and illumination
|
650 |
|
4 |
|a Comparative Study
|
650 |
|
4 |
|a Evaluation Study
|
650 |
|
4 |
|a Journal Article
|
650 |
|
4 |
|a Research Support, Non-U.S. Gov't
|
650 |
|
4 |
|a Research Support, U.S. Gov't, Non-P.H.S.
|
650 |
|
4 |
|a Validation Study
|
700 |
1 |
|
|a Koudelka, Melissa
|e verfasserin
|4 aut
|
700 |
1 |
|
|a Belhumeur, Peter
|e verfasserin
|4 aut
|
773 |
0 |
8 |
|i Enthalten in
|t IEEE transactions on pattern analysis and machine intelligence
|d 1979
|g 27(2005), 2 vom: 18. Feb., Seite 288-95
|w (DE-627)NLM098212257
|x 1939-3539
|7 nnns
|
773 |
1 |
8 |
|g volume:27
|g year:2005
|g number:2
|g day:18
|g month:02
|g pages:288-95
|
912 |
|
|
|a GBV_USEFLAG_A
|
912 |
|
|
|a SYSFLAG_A
|
912 |
|
|
|a GBV_NLM
|
912 |
|
|
|a GBV_ILN_350
|
951 |
|
|
|a AR
|
952 |
|
|
|d 27
|j 2005
|e 2
|b 18
|c 02
|h 288-95
|