Sciweavers

1242 search results - page 111 / 249
» Digital Objects as Passwords
Sort
View
MEMICS
2010
14 years 4 months ago
On Reliability and Refutability in Nonconstructive Identification
Identification in the limit, originally due to Gold [10], is a widely used computation model for inductive inference and human language acquisition. We consider a nonconstructive ...
Ilja Kucevalovs
MEMICS
2010
14 years 4 months ago
Instructor Selector Generation from Architecture Description
We describe an automated way to generate data for a practical LLVM instruction selector based on machine-generated description of the target architecture at register transfer leve...
Miloslav Trmac, Adam Husar, Jan Hranac, Tomas Hrus...
VLUDS
2010
187views Visualization» more  VLUDS 2010»
14 years 4 months ago
Survey on Benchmarks for a GPU Based Multi Camera Stereo Matching Algorithm
Stereo matching algorithms and multi camera reconstruction algorithms are usually compared using benchmarks. These benchmarks compare the quality of the resulting depth map or rec...
Klaus Denker, Georg Umlauf
RTA
2011
Springer
14 years 22 days ago
Maximal Completion
Given an equational system, completion procedures compute an equivalent and complete (terminating and confluent) term rewrite system. We present a very simple and efficient compl...
Dominik Klein, Nao Hirokawa
ICIP
1998
IEEE
15 years 11 months ago
Level Lines based Disocclusion
Object recognition, robotic vision, occluding noise removal or photograph design require the ability to perform disocclusion. We call disocclusion the recovery of hidden parts of ...
Simon Masnou, Jean-Michel Morel