Showing 4 open source projects for "stereo matching"

View related business solutions
  • Achieve perfect load balancing with a flexible Open Source Load Balancer Icon
    Achieve perfect load balancing with a flexible Open Source Load Balancer

    Take advantage of Open Source Load Balancer to elevate your business security and IT infrastructure with a custom ADC Solution.

    Boost application security and continuity with SKUDONET ADC, our Open Source Load Balancer, that maximizes IT infrastructure flexibility. Additionally, save up to $470 K per incident with AI and SKUDONET solutions, further enhancing your organization’s risk management and cost-efficiency strategies.
  • PRTG Network Monitor | Making the lives of sysadmins easier Icon
    PRTG Network Monitor | Making the lives of sysadmins easier

    Stay ahead of IT infrastructure issues

    PRTG Network Monitor is an all-inclusive monitoring software solution developed by Paessler. Equipped with an easy-to-use, intuitive interface with a cutting-edge monitoring engine, PRTG Network Monitor optimizes connections and workloads as well as reduces operational costs by avoiding outages while saving time and controlling service level agreements (SLAs). The solution is packed with specialized monitoring features that include flexible alerting, cluster failover solution, distributed monitoring, in-depth reporting, maps and dashboards, and more.
  • 1
    Provenance

    Provenance

    An iOS & tvOS Frontend for Multiple Emulators

    Provenance is an iOS & tvOS frontend for various emulators, supporting multiple Atari, Bandai, NEC, Nintendo, Sega, SNK and Sony console systems. It offers smooth and accurate, full-speed emulation to give you an awesome and genuine playing experience. Provenance is built with a host of awesome features, such as save anywhere and battery saves, controller support, automatic ROM matching and ROM customizations, and many more. Provenance supports a great number of console systems, with more...
    Downloads: 19 This Week
    Last Update:
    See Project
  • 2
    Phase transformation crystallography lab
    The purpose of this program is to calculate the phase transformation crystallography after a phase transformation and represent the results in graphical way such as in stereo graphic projection.The most recent crystallographic theories for both martensite and diffusional transformation are included.The variant selection during phase transformation could also be analyzed. The lattice matching near the interface, the superimposed diffraction patterns and so on can be readily simulated...
    Leader badge
    Downloads: 75 This Week
    Last Update:
    See Project
  • 3
    We presented an effective procedure for generating stereo images by self-calibration and producing quality depth maps by matching of stereo images. We demonstrate that the canopy height distribution can reveal distinctive responses in growth pattern over time, for different varieties subject to the same treatment and for the same variety subjected to different treatments. The results of the procedure are shown to compare favourably with and are indeed more consistent than manual measurements...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    A software to implement the existing stereo matching algorithms in computer vision, including the easiest SSD, and the newest algorithms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • ConnectWise Cybersecurity Management for MSPs Icon
    ConnectWise Cybersecurity Management for MSPs

    Software and support solutions to protect your clients’ critical business assets

    ConnectWise SIEM (formerly Perch) offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and see beyond your network traffic. Our team of threat analysts does all the tedium for you, eliminating the noise and sending only identified and verified treats to action on. Built with multi-tenancy, ConnectWise SIEM helps you keep clients safe with the best threat intel on the market.
  • Previous
  • You're on page 1
  • Next