Sciweavers

77 search results - page 7 / 16
» Clustering Validity Checking Methods: Part II
Sort
View
82
Voted
ICRA
2009
IEEE
163views Robotics» more  ICRA 2009»
15 years 4 months ago
On fast surface reconstruction methods for large and noisy point clouds
— In this paper we present a method for fast surface reconstruction from large noisy datasets. Given an unorganized 3D point cloud, our algorithm recreates the underlying surface...
Zoltan Csaba Marton, Radu Bogdan Rusu, Michael Bee...
ICIP
2010
IEEE
14 years 7 months ago
Detecting multiple copies in tampered images
Copy-move forgeries are parts of the image that are duplicated elsewhere into the same image, often after being modified by geometrical transformations. In this paper we present a...
Edoardo Ardizzone, Alessandro Bruno, Giuseppe Mazz...
88
Voted
CAV
2009
Springer
169views Hardware» more  CAV 2009»
15 years 10 months ago
Automatic Verification of Integer Array Programs
We provide a verification technique for a class of programs working on integer arrays of finite, but not a priori bounded length. We use the logic of integer arrays SIL [13] to spe...
Filip Konecný, Marius Bozga, Peter Habermeh...
FMICS
2006
Springer
15 years 1 months ago
SAT-Based Verification of LTL Formulas
Abstract. Bounded model checking (BMC) based on satisfiability testing (SAT) has been introduced as a complementary technique to BDDbased symbolic model checking of LTL properties ...
Wenhui Zhang
AIIDE
2008
14 years 12 months ago
Stochastic Plan Optimization in Real-Time Strategy Games
We present a domain independent off-line adaptation technique called Stochastic Plan Optimization for finding and improving plans in real-time strategy games. Our method is based ...
Andrew Trusty, Santiago Ontañón, Ash...