Sciweavers

1466 search results - page 232 / 294
» Completeness of the Authentication Tests
Sort
View
AI
2004
Springer
13 years 7 months ago
ASSAT: computing answer sets of a logic program by SAT solvers
We propose a new translation from normal logic programs with constraints under the answer set semantics to propositional logic. Given a normal logic program, we show that by addin...
Fangzhen Lin, Yuting Zhao
CORR
2002
Springer
108views Education» more  CORR 2002»
13 years 7 months ago
Confluent Drawings: Visualizing Non-planar Diagrams in a Planar Way
We introduce a new approach for drawing diagrams. Our approach is to use a technique we call confluent drawing for visualizing non-planar graphs in a planar way. This approach all...
Matthew Dickerson, David Eppstein, Michael T. Good...
JVCA
2000
232views more  JVCA 2000»
13 years 7 months ago
Realistic surface reconstruction of 3D scenes from uncalibrated image sequences
This contribution addresses the problem of obtaining 3D models from image sequences. A 3D surface description of the scene is extracted completely from a set of uncalibrated camer...
Reinhard Koch, Marc Pollefeys, Luc J. Van Gool
PAMI
2000
127views more  PAMI 2000»
13 years 7 months ago
Geometric Camera Calibration Using Circular Control Points
Modern CCD cameras are usually capable of a spatial accuracy greater than 1/50 of the pixel size. However, such accuracy is not easily attained due to various error sources that c...
Janne Heikkilä
ISJ
2002
84views more  ISJ 2002»
13 years 7 months ago
Transaction attributes and software outsourcing success: an empirical investigation of transaction cost theory
In recent years, an increasing amount of attention has been paid to information systems (IS) outsourcing by practitioners as well as academics. However, our understanding of the fa...
Eric T. G. Wang