GEGICK, MICHAEL CHARLES. Predicting Attack-prone Components with Source Code Static Analyzers. (Under the direction of Laurie Williams). No single vulnerability detection techniqu...
ct 7 An increasingly frequent application of Machine Vision technologies is in automated surface inspection for the detection of defects in 8 manufactured products. Such systems oï...
If robotic agents are to act autonomously they must have the ability to construct and reason about models of their physical environment. For example, planning to achieve goals req...
We discuss the problem of fitting an implicit shape model to a set of points sampled from a co-dimension one manifold of arbitrary topology. The method solves a non-convex optimis...
Christian Walder, Olivier Chapelle, Bernhard Sch&o...
Clinical studies are often conducted as multi-centered studies involving participants at different locations. Thus it becomes obvious that using mobile platforms and remote data e...