Sciweavers

1821 search results - page 347 / 365
» Security-Aware Program Transformations
Sort
View
LCTRTS
2010
Springer
15 years 3 days ago
Translating concurrent action oriented specifications to synchronous guarded actions
Concurrent Action-Oriented Specifications (CAOS) model the behavior of a synchronous hardware circuit as asynchronous guarded at an abstraction level higher than the Register Tran...
Jens Brandt, Klaus Schneider, Sandeep K. Shukla
BMCBI
2011
14 years 9 months ago
ASPDock: protein-protein docking algorithm using atomic solvation parameters model
Background: Atomic Solvation Parameters (ASP) model has been proven to be a very successful method of calculating the binding free energy of protein complexes. This suggests that ...
Lin Li, Dachuan Guo, Yangyu Huang, Shiyong Liu, Yi...
CVPR
2005
IEEE
16 years 4 months ago
Shape Matching and Object Recognition Using Low Distortion Correspondences
We approach recognition in the framework of deformable shape matching, relying on a new algorithm for finding correspondences between feature points. This algorithm sets up corres...
Alexander C. Berg, Tamara L. Berg, Jitendra Malik
ICCV
2003
IEEE
16 years 4 months ago
Multiclass Spectral Clustering
We propose a principled account on multiclass spectral clustering. Given a discrete clustering formulation, we first solve a relaxed continuous optimization problem by eigendecomp...
Stella X. Yu, Jianbo Shi
ICPR
2004
IEEE
16 years 3 months ago
Alignment of Multiple Non-Overlapping Axially Symmetric 3D Datasets
Uknown to us, an axially-symmetric surface is broken into disjoint pieces along a set of break-curves, i.e., the curves along which the surface locally breaks into two pieces. A s...
Andrew R. Willis, David B. Cooper