Sciweavers

319 search results - page 37 / 64
» Cryptographic Assumptions: A Position Paper
Sort
View
80
Voted
ICDAR
2009
IEEE
14 years 7 months ago
Logo Detection in Document Images Based on Boundary Extension of Feature Rectangles
A new method of logo detection in document images is proposed in this paper. It is based on the boundary extension of feature rectangles of which the definition is also given in t...
Hongye Wang, Youbin Chen
58
Voted
CAV
2010
Springer
153views Hardware» more  CAV 2010»
15 years 1 months ago
There's Plenty of Room at the Bottom: Analyzing and Verifying Machine Code
This paper discusses the obstacles that stand in the way of doing a good job of machine-code analysis. Compared with analysis of source code, the challenge is to drop all assumptio...
Thomas W. Reps, Junghee Lim, Aditya V. Thakur, Gog...
ICRA
2006
IEEE
105views Robotics» more  ICRA 2006»
15 years 3 months ago
Motion Planning for the Roller Racer with a Sticking/Slipping Switching Model
Abstract— The roller racer, an undulatory locomotion system, is a toy which can be propelled forward by sitting on it and only oscillating the steering handle. A nonholonomic dyn...
Peng Cheng, Emilio Frazzoli, Vijay Kumar
66
Voted
ICRA
1999
IEEE
115views Robotics» more  ICRA 1999»
15 years 1 months ago
Design of a Spider-Like Robot for Motion with Quasistatic Force Constraints
Abstract: This paper presents a novel design of a Jiegged "spider" robot capable of moving in a wide range of two-dimensional tunnels. The spider moves in a quasistatic m...
Shraga Shoval, Elon Rimon, Amir Shapiro
91
Voted
ICIP
2007
IEEE
14 years 9 months ago
ML Nonlinear Smoothing for Image Segmentation and its Relationship to the Mean Shift
This paper addresses the issues of nonlinear edge-preserving image smoothing and segmentation. A ML-based approach is proposed which uses an iterative algorithm to solve the probl...
Andy Backhouse, Irene Y. H. Gu, Tiesheng Wang