Sciweavers

5722 search results - page 1030 / 1145
» Security Function Interactions
Sort
View
139
Voted
CVPR
2012
IEEE
13 years 5 months ago
Top-down and bottom-up cues for scene text recognition
Scene text recognition has gained significant attention from the computer vision community in recent years. Recognizing such text is a challenging problem, even more so than the ...
Anand Mishra, Karteek Alahari, C. V. Jawahar
138
Voted
CVPR
2012
IEEE
13 years 5 months ago
Curvature-based regularization for surface approximation
We propose an energy-based framework for approximating surfaces from a cloud of point measurements corrupted by noise and outliers. Our energy assigns a tangent plane to each (noi...
Carl Olsson, Yuri Boykov
175
Voted
ISCA
2012
IEEE
224views Hardware» more  ISCA 2012»
13 years 5 months ago
A first-order mechanistic model for architectural vulnerability factor
Soft error reliability has become a first-order design criterion for modern microprocessors. Architectural Vulnerability Factor (AVF) modeling is often used to capture the probab...
Arun A. Nair, Stijn Eyerman, Lieven Eeckhout, Lizy...
119
Voted
BMCBI
2006
107views more  BMCBI 2006»
15 years 2 months ago
A reinforced merging methodology for mapping unique peptide motifs in members of protein families
Background: Members of a protein family often have highly conserved sequences; most of these sequences carry identical biological functions and possess similar three-dimensional (...
Hao-Teng Chang, Tun-Wen Pai, Tan-Chi Fan, Bo-Han S...
122
Voted
VIS
2007
IEEE
192views Visualization» more  VIS 2007»
16 years 3 months ago
LiveSync: Deformed Viewing Spheres for Knowledge-Based Navigation
Although real-time interactive volume rendering is available even for very large data sets, this visualization method is used quite rarely in the clinical practice. We suspect this...
Peter Kohlmann, Stefan Bruckner, Armin Kanitsar,...
« Prev « First page 1030 / 1145 Last » Next »