Search
Results
-
A Vote-and-Verify Strategy for Fast Spatial Verification in Image Retrieval
(2017)Lecture Notes in Computer Science ~ 13th Asian Conference on Computer Vision, Taipei, Taiwan, November 20-24, 2016, Revised Selected Papers. Part IConference Paper -
VSO: Visual Semantic Odometry
(2018)Lecture Notes in Computer Science ~ Computer Vision – ECCV 2018Conference Paper -
Mapping on the Fly: Real-Time 3D Dense Reconstruction, Digital Surface Map and Incremental Orthomosaic Generation for Unmanned Aerial Vehicles
(2017)Springer Proceedings in Advanced Robotics ~ Field and Service Robotics: Results of the 11th International ConferenceConference Paper -
Learning Priors for Semantic 3D Reconstruction
(2018)Lecture Notes in Computer Science ~ Computer Vision – ECCV 2018Conference Paper -
Learning to Fuse Proposals from Multiple Scanline Optimizations in Semi-Global Matching
(2018)Lecture Notes in Computer Science ~ Computer Vision – ECCV 2018: 15th European Conference, Munich, Germany, September 8-14, 2018, Proceedings, Part XIIIConference Paper -
Comparative Evaluation of Hand-Crafted and Learned Local Features
(2017)2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)Conference Paper -
Indoor-outdoor 3D reconstruction alignment
(2016)Lecture Notes in Computer Science ~ Computer Vision - ECCV 2016Conference Paper -
Pixelwise view selection for unstructured multi-view stereo
(2016)Lecture Notes in Computer Science ~ Computer Vision – ECCV 2016Conference Paper -
A Multi-View Stereo Benchmark with High-Resolution Images and Multi-Camera Videos
(2017)2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)Conference Paper -
Privacy Preserving Structure-from-Motion
(2020)Lecture Notes in Computer Science ~ Computer Vision – ECCV 2020Over the last years, visual localization and mapping solutions have been adopted by an increasing number of mixed reality and robotics systems. The recent trend towards cloud-based localization and mapping systems has raised significant privacy concerns. These are mainly grounded by the fact that these services require users to upload visual data to their servers, which can reveal potentially confidential information, even if only derived ...Conference Paper