Sciweavers

342 search results - page 39 / 69
» Components for Object Detection and Identification
Sort
View
COMPSAC
2006
IEEE
15 years 3 months ago
An Ontology-Based Approach to Software Comprehension - Reasoning about Security Concerns
There exists a large variety of techniques to detect and correct software security vulnerabilities at the source code level, including human code reviews, testing, and static anal...
Yonggang Zhang, Juergen Rilling, Volker Haarslev
ETS
2009
IEEE
128views Hardware» more  ETS 2009»
14 years 7 months ago
Algorithms for ADC Multi-site Test with Digital Input Stimulus
This paper reports two novel algorithms based on time-modulo reconstruction method intended for detection of the parametric faults in analogue-to-digital converters (ADC). In both ...
Xiaoqin Sheng, Hans G. Kerkhoff, Amir Zjajo, Guido...
70
Voted
JMM2
2007
117views more  JMM2 2007»
14 years 9 months ago
Image Segmentation using Multi-Coloured Active Illumination
— In this paper, the use of active illumination is extended to image segmentation, specifically in the case of overlapping particles. This work is based on Multi-Flash Imaging (M...
Tze Ki Koh, Nicholas Miles, Steve Morgan, Barrie H...
86
Voted
EUROGP
2009
Springer
143views Optimization» more  EUROGP 2009»
14 years 7 months ago
A Real-Time Evolutionary Object Recognition System
We have created a real-time evolutionary object recognition system. Genetic Programming is used to automatically search the space of possible computer vision programs guided throug...
Marc Ebner
38
Voted
ICIP
2005
IEEE
15 years 11 months ago
Countering oversegmentation in partitioning-based connectivities
A new theoretical development is presented for handling the over-segmentation problem in partitioning-based connected openings. The definition we propose treats singletons generat...
Georgios K. Ouzounis, Michael H. F. Wilkinson