—Detection of spurious features is instrumental in many computer vision applications. The standard approach is feature based, where extracted features are matched between the ima...
Using conditional promises, the reliability of promises can be measured without considering the reliability of the whole agent, by defining notions of when conditions operate and ...
Abstract. This paper describe the implementation and underlying philosophie of a large scale distributed computation of K-optimal lattice rules. The computation is huge correspondi...
GEGICK, MICHAEL CHARLES. Predicting Attack-prone Components with Source Code Static Analyzers. (Under the direction of Laurie Williams). No single vulnerability detection techniqu...
Reconstruction of patient-specific 3D bone surface from 2D calibrated fluoroscopic images and a point distribution model is discussed. We present a 2D/3D reconstruction scheme comb...