Sciweavers

794 search results - page 152 / 159
» grid 2006
Sort
View
AIM
2002
13 years 9 months ago
Computational Vulnerability Analysis for Information Survivability
The Infrastructure of modern society is controlled by software systems. These systems are vulnerable to attacks; several such attacks, launched by "recreation hackers" h...
Howard E. Shrobe
JEI
2000
134views more  JEI 2000»
13 years 9 months ago
Pattern matching using the blur hit - miss transform
The usefulness of the hit-miss transform (HMT) and related transforms for pattern matching in document image applications is examined. Although the HMT is sensitive to the types o...
Dan S. Bloomberg, Luc Vincent
NA
2007
147views more  NA 2007»
13 years 9 months ago
An adaptive spectral least-squares scheme for the Burgers equation
A least-squares spectral collocation method for the one-dimensional inviscid Burgers equation is proposed. This model problem shows the stability and high accuracy of these scheme...
Wilhelm Heinrichs
NAR
2007
115views more  NAR 2007»
13 years 9 months ago
DroSpeGe: rapid access database for new Drosophila species genomes
The Drosophila species comparative genome database DroSpeGe (http://insects.eugenes.org/ DroSpeGe/) provides genome researchers with rapid, usable access to 12 new and old Drosoph...
Donald G. Gilbert
PAMI
2007
336views more  PAMI 2007»
13 years 9 months ago
Topological Equivalence between a 3D Object and the Reconstruction of Its Digital Image
— Digitization is not as easy as it looks. If one digitizes a 3D object even with a dense sampling grid, the reconstructed digital object may have topological distortions and in ...
Peer Stelldinger, Longin Jan Latecki, Marcelo Siqu...