Sciweavers

2629 search results - page 453 / 526
» Build a Computer from Scratch
Sort
View
TIP
2008
287views more  TIP 2008»
13 years 10 months ago
3-D Object Recognition Using 2-D Views
We consider the problem of recognizing 3-D objects from 2-D images using geometric models and assuming different viewing angles and positions. Our goal is to recognize and localize...
Wenjing Li, George Bebis, Nikolaos G. Bourbakis
JMIV
2007
92views more  JMIV 2007»
13 years 10 months ago
Uniquely-Determined Thinning of the Tie-Zone Watershed Based on Label Frequency
There are many watershed transform algorithms in literature but most of them do not exactly correspond to their respective definition. The solution given by such algorithms depend...
Romaric Audigier, Roberto de Alencar Lotufo
INFORMS
1998
150views more  INFORMS 1998»
13 years 10 months ago
Branch and Infer: A Unifying Framework for Integer and Finite Domain Constraint Programming
constraint abstractions into integer programming, and to discuss possible combinations of the two approaches. Combinatorial problems are ubiquitous in many real world applications ...
Alexander Bockmayr, Thomas Kasper
WIOPT
2010
IEEE
13 years 9 months ago
Flunet: Automated tracking of contacts during flu season
— By analyzing people’s contact patterns over time, it is possible to build efficient delay tolerant networking (DTN) algorithms and derive important data for parameterizing an...
Mohammad S. Hashemian, Kevin G. Stanley, Nathaniel...
ISW
2010
Springer
13 years 8 months ago
Artificial Malware Immunization Based on Dynamically Assigned Sense of Self
Computer malwares (e.g., botnets, rootkits, spware) are one of the most serious threats to all computers and networks. Most malwares conduct their malicious actions via hijacking t...
Xinyuan Wang, Xuxian Jiang