Sciweavers

2421 search results - page 382 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
CVPR
2010
IEEE
13 years 10 months ago
Fast directional chamfer matching
We study the object localization problem in images given a single hand-drawn example or a gallery of shapes as the object model. Although many shape matching algorithms have been ...
Ming-Yu Liu, Oncel Tuzel, Ashok Veeraraghavan, Ram...
AMAI
2007
Springer
13 years 10 months ago
Decision procedures for extensions of the theory of arrays
The theory of arrays, introduced by McCarthy in his seminal paper “Toward a mathematical science of computation”, is central to Computer Science. Unfortunately, the theory alo...
Silvio Ghilardi, Enrica Nicolini, Silvio Ranise, D...
ASE
2006
148views more  ASE 2006»
13 years 10 months ago
PLFaultCAT: A Product-Line Software Fault Tree Analysis Tool
Industry currently employs a product line approach to software development and deployment as a means to enhance quality while reducing development cost and time. This effort has cr...
Josh Dehlinger, Robyn R. Lutz
MICRO
2006
IEEE
88views Hardware» more  MICRO 2006»
13 years 10 months ago
SWICH: A Prototype for Efficient Cache-Level Checkpointing and Rollback
Low-overhead checkpointing and rollback is a popular technique for fault recovery. While different approaches are possible, hardware-supported checkpointing and rollback at the ca...
Radu Teodorescu, Jun Nakano, Josep Torrellas
SIGMOD
2001
ACM
124views Database» more  SIGMOD 2001»
14 years 10 months ago
Query Optimization In Compressed Database Systems
Over the last decades, improvements in CPU speed have outpaced improvements in main memory and disk access rates by orders of magnitude, enabling the use of data compression techn...
Zhiyuan Chen, Johannes Gehrke, Flip Korn