Sciweavers

1036 search results - page 176 / 208
» Design methods as discourse on practice
Sort
View
3DPVT
2002
IEEE
128views Visualization» more  3DPVT 2002»
14 years 16 days ago
Towards Automatic Modeling of Monuments and Towers
Three-dimensional modeling from images, when carried out entirely by a human, can be time consuming and impractical for large-scale projects. On the other hand, full automation ma...
Sabry F. El-Hakim, J.-Angelo Beraldin, Jean-Fran&c...
CIMAGING
2009
192views Hardware» more  CIMAGING 2009»
13 years 8 months ago
Compressive coded aperture imaging
Nonlinear image reconstruction based upon sparse representations of images has recently received widespread attention with the emerging framework of compressed sensing (CS). This ...
Roummel F. Marcia, Zachary T. Harmany, Rebecca Wil...
CSDA
2006
103views more  CSDA 2006»
13 years 7 months ago
LASS: a tool for the local analysis of self-similarity
The Hurst parameter H characterizes the degree of long-range dependence (and asymptotic selfsimilarity) in stationary time series. Many methods have been developed for the estimat...
Stilian Stoev, Murad S. Taqqu, Cheolwoo Park, Geor...
SPIN
2010
Springer
13 years 6 months ago
Context-Bounded Translations for Concurrent Software: An Empirical Evaluation
Abstract. Context-Bounded Analysis has emerged as a practical automatic formal analysis technique for fine-grained, shared-memory concurrent software. Two recent papers (in CAV 20...
Naghmeh Ghafari, Alan J. Hu, Zvonimir Rakamaric
ASIACRYPT
2010
Springer
13 years 5 months ago
A Closer Look at Anonymity and Robustness in Encryption Schemes
Abstract. In this work, we take a closer look at anonymity and robustness in encryption schemes. Roughly speaking, an anonymous encryption scheme hides the identity of the secret-k...
Payman Mohassel