Sciweavers

5964 search results - page 1121 / 1193
» A theory of speculative computation
Sort
View
249
Voted
ACCV
2009
Springer
15 years 11 months ago
Estimating Human Pose from Occluded Images
We address the problem of recovering 3D human pose from single 2D images, in which the pose estimation problem is formulated as a direct nonlinear regression from image observation...
Jia-Bin Huang and Ming-Hsuan Yang
125
Voted
ICDT
2010
ACM
211views Database» more  ICDT 2010»
15 years 10 months ago
Probabilistic Data Exchange
The work reported here lays the foundations of data exchange in the presence of probabilistic data. This requires rethinking the very basic concepts of traditional data exchange, ...
Ronald Fagin, Benny Kimelfeld, Phokion Kolaitis
92
Voted
ALT
2005
Springer
15 years 9 months ago
Non U-Shaped Vacillatory and Team Learning
U-shaped learning behaviour in cognitive development involves learning, unlearning and relearning. It occurs, for example, in learning irregular verbs. The prior cognitive science...
Lorenzo Carlucci, John Case, Sanjay Jain, Frank St...
110
Voted
ICCAD
2006
IEEE
139views Hardware» more  ICCAD 2006»
15 years 9 months ago
Analog placement with symmetry and other placement constraints
In order to handle device matching in analog circuits, some pairs of modules are required to be placed symmetrically. This paper addresses this device-level placement problem for ...
Yiu-Cheong Tam, Evangeline F. Y. Young, Chris C. N...
PEPM
2010
ACM
15 years 9 months ago
Context-sensitive analysis of obfuscated x86 executables
A method for context-sensitive analysis of binaries that may have obfuscated procedure call and return operations is presented. Such binaries may use operators to directly manipul...
Arun Lakhotia, Davidson R. Boccardo, Anshuman Sing...
« Prev « First page 1121 / 1193 Last » Next »