Sciweavers

350 search results - page 29 / 70
» A Component-Labeling Algorithm Using Contour Tracing Techniq...
Sort
View
ICIP
2005
IEEE
14 years 10 months ago
Image-based stereoscopic stylization
We present a method to generate stylized stereo imagery that effectively communicates shape and distance of the depicted scene objects. We use computer vision techniques to analyz...
Efstathios Stavrakis, Michael Bleyer, Danijela Mar...
CVPR
2006
IEEE
14 years 10 months ago
Control Theory and Fast Marching Techniques for Brain Connectivity Mapping
We propose a novel, fast and robust technique for the computation of anatomical connectivity in the brain. Our approach exploits the information provided by Diffusion Tensor Magne...
Emmanuel Prados, Stefano Soatto, Christophe Lengle...
GLVLSI
2005
IEEE
85views VLSI» more  GLVLSI 2005»
14 years 2 months ago
VLSI CAD tool protection by birthmarking design solutions
Many techniques have been proposed in the past for the protection of VLSI design IPs (intellectual property). CAD tools and algorithms are intensively used in all phases of modern...
Lin Yuan, Gang Qu, Ankur Srivastava
KDD
2007
ACM
151views Data Mining» more  KDD 2007»
14 years 9 months ago
Efficient mining of iterative patterns for software specification discovery
Studies have shown that program comprehension takes up to 45% of software development costs. Such high costs are caused by the lack-of documented specification and further aggrava...
Chao Liu 0001, David Lo, Siau-Cheng Khoo
OOPSLA
2007
Springer
14 years 2 months ago
The design and implementation of formal monitoring techniques
In runtime monitoring, a programmer specifies a piece of code to execute when a trace of events occurs during program execution. Previous and related work has shown that runtime m...
Eric Bodden