Sciweavers

2006 search results - page 142 / 402
» Heuristic Security-Testing Methods
Sort
View
ICIG
2009
IEEE
14 years 10 months ago
Statistical Modeling of Optical Flow
Optical flow estimation is one of the main subjects in computer vision. Many methods developed to compute the motion fields are built using standard heuristic formulation. In this...
Dongmin Ma, Véronique Prinet, Cyril Cassisa
135
Voted
CVIU
2010
163views more  CVIU 2010»
15 years 26 days ago
Automated handwashing assistance for persons with dementia using video and a partially observable Markov decision process
This paper presents a real-time vision-based system to assist a person with dementia wash their hands. The system uses only video inputs, and assistance is given as either verbal ...
Jesse Hoey, Pascal Poupart, Axel von Bertoldi, Tam...
109
Voted
BMCBI
2006
86views more  BMCBI 2006»
15 years 25 days ago
MCALIGN2: Faster, accurate global pairwise alignment of non-coding DNA sequences based on explicit models of indel evolution
Background: Non-coding DNA sequences comprise a very large proportion of the total genomic content of mammals, most other vertebrates, many invertebrates, and most plants. Unravel...
Jun Wang, Peter D. Keightley, Toby Johnson
107
Voted
ICPR
2008
IEEE
16 years 2 months ago
Efficient video text detection using edge features
In this paper, we explore new edge features such as straightness for the elimination of non significant edges from the segmented text portion of a video frame to detect accurate b...
Palaiahnakote Shivakumara, Weihua Huang, Chew Lim ...
ICCAD
2008
IEEE
153views Hardware» more  ICCAD 2008»
15 years 9 months ago
Boolean factoring and decomposition of logic networks
This paper presents new methods for restructuring logic networks based on fast Boolean techniques. The basis for these are 1) a cut based view of a logic network, 2) exploiting th...
Alan Mishchenko, Robert K. Brayton, Satrajit Chatt...