Sciweavers

3238 search results - page 590 / 648
» Multi-return function call
Sort
View
PR
2008
173views more  PR 2008»
13 years 9 months ago
Object recognition using a generalized robust invariant feature and Gestalt's law of proximity and similarity
In this paper, we propose a new context-based method for object recognition. We first introduce a neuro-physiologically motivated visual part detector. We found that the optimal f...
Sungho Kim, Kuk-Jin Yoon, In-So Kweon
SIAMDM
2008
119views more  SIAMDM 2008»
13 years 9 months ago
On the Graph Bisection Cut Polytope
Given a graph G = (V, E) with node weights v N {0}, v V , and some number F N{0}, the convex hull of the incidence vectors of all cuts (S), S V with (S) F and (V \ S) F is ...
Michael Armbruster, Christoph Helmberg, Marzena F&...
PUC
2006
89views more  PUC 2006»
13 years 9 months ago
UbiqStack: a taxonomy for a ubiquitous computing software stack
This paper describes a taxonomy for a ubiquitous computing software stack called UbiqStack. Through the lens of the UbiqStack taxonomy we survey a variety of subsystems designed to...
Martin Modahl, Bikash Agarwalla, T. Scott Saponas,...
IJHPCA
2007
88views more  IJHPCA 2007»
13 years 9 months ago
A Portable Method for Finding User Errors in the Usage of MPI Collective Operations
An MPI profiling library is a standard mechanism for intercepting MPI calls by applications. Profiling libraries are so named because they are commonly used to gather runtime in...
Christopher Falzone, Anthony Chan, Ewing L. Lusk, ...
TCSB
2008
13 years 9 months ago
Robustness to Code and Data Deletion in Autocatalytic Quines
Abstract. Software systems nowadays are becoming increasingly complex and vulnerable to all sorts of failures and attacks. There is a rising need for robust self-repairing systems ...
Thomas Meyer, Daniel Schreckling, Christian F. Tsc...