Sciweavers

406 search results - page 36 / 82
» Identifying Codes and Covering Problems
Sort
View
DAGM
2006
Springer
14 years 11 days ago
Segmentation-Based Motion with Occlusions Using Graph-Cut Optimization
Abstract. We propose to tackle the optical flow problem by a combination of two recent advances in the computation of dense correspondences, namely the incorporation of image segme...
Michael Bleyer, Christoph Rhemann, Margrit Gelautz
ECIS
2001
13 years 10 months ago
The Requirements of Methodologies for Developing Web Applications
The Internet has had a significant impact on the process of developing information systems. However, there has been little research that has examined specifically the role of deve...
Craig Standing
SRDS
2010
IEEE
13 years 6 months ago
A Study on Latent Vulnerabilities
Abstract-Software code reuse has long been touted as a reliable and efficient software development paradigm. Whilst this practice has numerous benefits, it is inherently susceptibl...
Beng Heng Ng, Xin Hu, Atul Prakash
CGO
2004
IEEE
14 years 13 days ago
Static Identification of Delinquent Loads
The effective use of processor caches is crucial to the performance of applications. It has been shown that cache misses are not evenly distributed throughout a program. In applic...
Vlad-Mihai Panait, Amit Sasturkar, Weng-Fai Wong
AMC
2008
111views more  AMC 2008»
13 years 8 months ago
Chemical agent detector placement methodology
Terrorism is a threat to global peace in our world today and in the future this terrorist threat is surely going to be important. Global terrorist groups have highly sophisticated...
Cevriye Gencer, Emel Kizilkaya Aydogan, Abdullah S...