Sciweavers

10458 search results - page 1940 / 2092
» Modeling Features at Runtime
Sort
View
BMVC
2010
13 years 4 months ago
Epipolar Constraints for Multiscale Matching
Many recent keypoint detectors associate a local scale (for multiscale detectors) or even a full affine frame (for affine-invariant detectors) to each detected keypoint. Although ...
Bill Triggs, Pashmina Bendale
CORR
2011
Springer
142views Education» more  CORR 2011»
13 years 4 months ago
A Logical Method for Policy Enforcement over Evolving Audit Logs
We present an iterative algorithm for enforcing policies represented in a first-order logic, which can, in particular, express all transmission-related clauses in the HIPAA Priva...
Deepak Garg, Limin Jia, Anupam Datta
JSAC
2011
115views more  JSAC 2011»
13 years 4 months ago
Scalable Cross-Layer Wireless Access Control Using Multi-Carrier Burst Contention
Abstract—The increasing demand for wireless access in vehicular environments (WAVE) supporting a wide range of applications such as traffic safety, surveying, infotainment etc.,...
Bogdan Roman, Ian J. Wassell, Ioannis Chatzigeorgi...
TITS
2011
247views more  TITS 2011»
13 years 4 months ago
Road Detection Based on Illuminant Invariance
—By using an onboard camera, it is possible to detect the free road surface ahead of the ego-vehicle. Road detection is of high relevance for autonomous driving, road departure w...
José M. Álvarez, Antonio M. Lopez
EJC
2010
13 years 3 months ago
Inferencing in Database Semantics
As a computational model of natural language communication, Database Semantics1 (DBS) includes a hearer mode and a speaker mode. For the content to be mapped into language expressi...
Roland Hausser
« Prev « First page 1940 / 2092 Last » Next »