Sciweavers

1056 search results - page 53 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
DATE
2010
IEEE
175views Hardware» more  DATE 2010»
13 years 11 months ago
Approximate logic synthesis for error tolerant applications
─ Error tolerance formally captures the notion that – for a wide variety of applications including audio, video, graphics, and wireless communications – a defective chip that...
Doochul Shin, Sandeep K. Gupta
ACSAC
2007
IEEE
14 years 2 months ago
Automated Security Debugging Using Program Structural Constraints
Understanding security bugs in a vulnerable program is a non-trivial task, even if the target program is known to be vulnerable. Though there exist debugging tools that facilitate...
Chongkyung Kil, Emre Can Sezer, Peng Ning, Xiaolan...
RULEML
2005
Springer
14 years 1 months ago
Extending the SweetDeal Approach for e-Procurement Using SweetRules and RuleML
We show the first detailed realistic e-business application scenario that uses and exploits capabilities of the SweetRules V2.1 toolset for e-contracting using the SweetDeal approa...
Sumit Bhansali, Benjamin N. Grosof
CVPR
2006
IEEE
14 years 9 months ago
Reciprocal Image Features for Uncalibrated Helmholtz Stereopsis
Helmholtz stereopsis is a surface reconstruction method that exploits reciprocity for the recovery of 3D shape without an assumed BRDF model, and it has been shown to yield high q...
Todd Zickler
ICCV
1999
IEEE
14 years 9 months ago
Segmentation of Salient Closed Contours from Real Images
Using a saliency measure based on the global property of contour closure, we have developed a method that reliably segments out salient contours bounding unknown objects from real...
Shyjan Mahamud, Karvel K. Thornber, Lance R. Willi...