Sciweavers

2006 search results - page 327 / 402
» Heuristic Security-Testing Methods
Sort
View
DAC
1999
ACM
14 years 1 months ago
Behavioral Synthesis of Analog Systems Using Two-layered Design Space Exploration
This paper presents a novel approach for synthesis of analog systems from behavioral VHDL-AMS specifications. We implemented this approach in the VASE behavioral-synthesis tool. ...
Alex Doboli, Adrián Núñez-Ald...
SIGGRAPH
1999
ACM
14 years 1 months ago
Creating Generative Models from Range Images
We describe a new approach for creating concise high-level generative models from range images or other approximate representations of real objects. Using data from a variety of a...
Ravi Ramamoorthi, James Arvo
ICCV
1999
IEEE
14 years 1 months ago
Multi-Frame Optical Flow Estimation using Subspace Constraints
We show that the set of all ow- elds in a sequence of frames imaging a rigid scene resides in a lowdimensional linear subspace. Based on this observation, we develop a method for ...
Michal Irani
ICDAR
1999
IEEE
14 years 1 months ago
MergeLayouts: Overcoming Faulty Segmentations by a Comprehensive Voting of Commercial OCR Devices
In this paper, we will present a comprehensive voting approach, taking entire layouts obtained from commercial OCR devices as input. Such a layout comprises segments of three kind...
Stefan Klink, Thorsten Jäger
ICDCS
1999
IEEE
14 years 1 months ago
Active Correlation Tracking
We describe methods of identifying and exploiting sharing patterns in multi-threaded DSM applications. Active correlation tracking is used to determine the affinity, or amount of ...
Kritchalach Thitikamol, Peter J. Keleher