Sciweavers

1717 search results - page 260 / 344
» Error concealment using a diffusion based method
Sort
View
IROS
2006
IEEE
96views Robotics» more  IROS 2006»
15 years 4 months ago
Topological Mapping Inspired by Techniques in DNA Sequence Alignment
Abstract— This paper introduces a method of building topological maps using sequences of images and the approximate string matching algorithm, which is commonly used in DNA seque...
Alan M. Zhang, Lindsay Kleeman, R. Andrew Russell
DATE
1999
IEEE
134views Hardware» more  DATE 1999»
15 years 2 months ago
Verifying Imprecisely Working Arithmetic Circuits
If real number calculations are implemented as circuits, only a limited preciseness can be obtained. Hence, formal verification can not be used to prove the equivalence between th...
Michaela Huhn, Klaus Schneider, Thomas Kropf, Geor...
LREC
2008
142views Education» more  LREC 2008»
14 years 11 months ago
Enriching Frame Semantic Resources with Dependency Graphs
We propose two general and robust methods for enriching resources annotated in the Frame Semantic paradigm with syntactic dependency graphs, which can provide useful additional in...
Hagen Fürstenau
CVPR
2005
IEEE
15 years 12 months ago
WaldBoost - Learning for Time Constrained Sequential Detection
: In many computer vision classification problems, both the error and time characterizes the quality of a decision. We show that such problems can be formalized in the framework of...
Jan Sochman, Jiri Matas
JNSM
2008
130views more  JNSM 2008»
14 years 10 months ago
Declarative Infrastructure Configuration Synthesis and Debugging
There is a large conceptual gap between end-to-end infrastructure requirements and detailed component configuration implementing those requirements. Today, this gap is manually br...
Sanjai Narain, Gary Levin, Sharad Malik, Vikram Ka...