The paper presents results of the face verification contest that was organized in conjunction with International Conference on Pattern Recognition 2000 [14]. Participants had to u...
Jiri Matas, Miroslav Hamouz, Kenneth Jonsson, Jose...
An embedded system the system continuously interacts with its environment under strict timing constraints, called the external constraints, and it is important to know how these e...
This paper describes an automatic tissue segmentation method for neonatal MRI. The analysis and study of neonatal brain MRI is of great interest due to its potential for studying e...
Marcel Prastawa, John H. Gilmore, Weili Lin, Guido...
The k-Nearest Neighbors algorithm can be easily adapted to classify complex objects (e.g. sets, graphs) as long as a proper dissimilarity function is given over an input space. Bo...
Adam Woznica, Alexandros Kalousis, Melanie Hilario
A method for extracting syntactic specifications from heapmanipulating code is described. The state of the heap is represented as an environment mapping each variable or field to ...