Sciweavers

2801 search results - page 132 / 561
» On the Adequateness of the Connection Method
Sort
View
137
Voted
CDC
2009
IEEE
140views Control Systems» more  CDC 2009»
15 years 9 months ago
Model reduction, optimal prediction, and the Mori-Zwanzig representation of Markov chains
— Model reduction methods from diverse fields— including control, statistical mechanics and economics—aimed at systems that can be represented by Markov chains, are discusse...
Carolyn L. Beck, Sanjay Lall, Tzuchen Liang, Matth...
ECCV
2004
Springer
16 years 6 months ago
Morphological Operations on Matrix-Valued Images
The output of modern imaging techniques such as diffusion tensor MRI or the physical measurement of anisotropic behaviour in materials such as the stress-tensor consists of tensor-...
Bernhard Burgeth, Martin Welk, Christian Feddern, ...
ICIP
2007
IEEE
16 years 6 months ago
Robust Hash for Detecting and Localizing Image Tampering
An image hash should be (1) robust to allowable operations and (2) sensitive to illegal manipulations (like image tampering) and distinct queries. Although existing methods try to...
Sujoy Roy, Qibin Sun
107
Voted
DAC
2004
ACM
16 years 5 months ago
Defining coverage views to improve functional coverage analysis
Coverage analysis is used to monitor the quality of the verification process. Reports provided by coverage tools help users identify areas in the design that have not been adequat...
Sigal Asaf, Eitan Marcus, Avi Ziv
SMI
2007
IEEE
136views Image Analysis» more  SMI 2007»
15 years 11 months ago
Realistic Hair from a Sketch
This paper explores a sketch-based interface for quickly yet accurately creating visually realistic hair for virtual characters. Recently, physically-based models have proved succ...
Jamie Wither, Florence Bertails, Marie-Paule Cani