Sciweavers

4155 search results - page 84 / 831
» External Memory Algorithms
Sort
View
ISVC
2009
Springer
15 years 9 months ago
Deconvolving Active Contours for Fluorescence Microscopy Images
Abstract. We extend active contours to constrained iterative deconvolution by replacing the external energy function with a model-based likelihood. This enables sub-pixel estimatio...
Jo A. Helmuth, Ivo F. Sbalzarini
ICRA
2002
IEEE
78views Robotics» more  ICRA 2002»
15 years 7 months ago
A Sensorless Insertion Strategy for Rigid Planar Parts
The companion paper [2] derives an algorithm that determines the external wrenches consistent with constraints on the contact interactions between two rigid planar bodies. In this...
Devin J. Balkcom, E. J. Gottlieb, Jeffrey C. Trink...
111
Voted
CAE
2005
15 years 4 months ago
Form Follows Function: Aesthetic Interactive Labels
Labels effectively convey co-referential relations between textual and visual elements and are a powerful tool to support learning tasks. Therefore, almost all illustrations in sc...
Timo Götzelmann, Kamran Ali, Knut Hartmann, T...
112
Voted
ICLP
2007
Springer
15 years 8 months ago
Static Region Analysis for Mercury
Abstract. Region-based memory management is a form of compiletime memory management, well-known from the functional programming world. This paper describes a static region analysis...
Quan Phan, Gerda Janssens
112
Voted
ACSD
1998
IEEE
90views Hardware» more  ACSD 1998»
15 years 6 months ago
Verification of Pipelined Microprocessors by Correspondence Checking in Symbolic Ternary Simulation
This paper makes the idea of memory shadowing [5] applicable to symbolic ternary simulation. Memory shadowing, an extension of Burch and Dill's pipeline verification method [...
Miroslav N. Velev, Randal E. Bryant