Sciweavers

1314 search results - page 195 / 263
» Validation of Object Oriented Models using Animation
Sort
View
JAIR
2008
93views more  JAIR 2008»
13 years 8 months ago
A Rigorously Bayesian Beam Model and an Adaptive Full Scan Model for Range Finders in Dynamic Environments
This paper proposes and experimentally validates a Bayesian network model of a range finder adapted to dynamic environments. All modeling assumptions are rigorously explained, and...
Tinne De Laet, Joris De Schutter, Herman Bruyninck...
BC
2005
127views more  BC 2005»
13 years 8 months ago
Computational modeling and exploration of contour integration for visual saliency
Abstract Weproposeacomputationalmodelofcontourintegration for visual saliency. The model uses biologically plausible devices to simulate how the representations of elements aligned...
T. Nathan Mundhenk, Laurent Itti
ICIP
2004
IEEE
14 years 10 months ago
Shape estimation of 3-D DNA molecules from stereo cryo-electron micro-graphs
We introduce a 3-D parametric active contour algorithm for the shape estimation of DNA molecules from stereo cryo-electron micrographs. We consider a 3-D filament (consisting of a...
Mathews Jacob, Thierry Blu, Michael Unser
SIGSOFT
2007
ACM
14 years 9 months ago
Symbolic message sequence charts
Message Sequence Charts (MSCs) are a widely used visual formalism for scenario-based specifications of distributed reactive systems. In its conventional usage, an MSC captures an ...
Abhik Roychoudhury, Ankit Goel, Bikram Sengupta
CSREASAM
2006
13 years 10 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin