Sciweavers

466 search results - page 66 / 94
» Representation and Computation of Boolean Combinations of Sc...
Sort
View
ICCV
2007
IEEE
14 years 10 months ago
Rotational Motion Deblurring of a Rigid Object from a Single Image
Most previous motion deblurring methods restore the degraded image assuming a shift-invariant linear blur filter. These methods are not applicable if the blur is caused by spatial...
Qi Shan, Wei Xiong, Jiaya Jia
CVPR
2008
IEEE
14 years 3 months ago
Learning a geometry integrated image appearance manifold from a small training set
While low-dimensional image representations have been very popular in computer vision, they suffer from two limitations: (i) they require collecting a large and varied training se...
Yilei Xu, Amit K. Roy Chowdhury
CI
2000
114views more  CI 2000»
13 years 8 months ago
A Guided Tour through Some Extensions of the Event Calculus
Kowalski and Sergot's Event Calculus (EC) is a simple temporal formalism that, given a set of event occurrences, derives the maximal validity intervals (MVIs) over which prop...
Iliano Cervesato, Massimo Franceschet, Angelo Mont...
CSCLP
2008
Springer
13 years 10 months ago
An Efficient Decision Procedure for Functional Decomposable Theories Based on Dual Constraints
Abstract. Over the last decade, first-order constraints have been efficiently used in the artificial intelligence world to model many kinds of complex problems such as: scheduling,...
Khalil Djelloul
CCS
2007
ACM
14 years 2 months ago
Topological analysis of network attack vulnerability
: To understand overall vulnerability to network attack, one must consider attacker exploits not just in isolation, but also in combination. That is, one must analyze how low-level...
Sushil Jajodia