Sciweavers

371 search results - page 25 / 75
» Computation of the Minimal Associated Primes
Sort
View
JCO
2006
67views more  JCO 2006»
13 years 7 months ago
Resource allocation for restoration of compromised systems
Computer systems are constantly under the threats of being attacked and in many cases these attacks succeed. Today's networked systems are thus built to be intrusion tolerant....
Qunwei Zheng, Sibabrata Ray, Xiaoyan Hong
ICCV
2007
IEEE
14 years 9 months ago
On the Differential Geometry of 3D Flow Patterns: Generalized Helicoids and Diffusion MRI Analysis
Configurations of dense locally parallel 3D curves occur in medical imaging, computer vision and graphics. Examples include white matter fibre tracts, textures, fur and hair. We d...
Peter Savadjiev, Steven W. Zucker, Kaleem Siddiqi
PAMI
2006
226views more  PAMI 2006»
13 years 7 months ago
Graph Partitioning Active Contours (GPAC) for Image Segmentation
In this paper we introduce new type of variational segmentation cost functions and associated active contour methods that are based on pairwise similarities or dissimilarities of t...
Baris Sumengen, B. S. Manjunath
ICCAD
2001
IEEE
89views Hardware» more  ICCAD 2001»
14 years 4 months ago
Sequential SPFDs
SPFDs are a mechanism to express flexibility in Boolean networks. Introduced by Yamashita et al. in the context of FPGA synthesis [4], they were extended later to general combina...
Subarnarekha Sinha, Andreas Kuehlmann, Robert K. B...
DIS
2007
Springer
14 years 1 months ago
A Consequence Finding Approach for Full Clausal Abduction
Abductive inference has long been associated with the logic of scientific discovery and automated abduction is now being used in real scientific tasks. But few methods can exploi...
Oliver Ray, Katsumi Inoue