Sciweavers

2131 search results - page 303 / 427
» Immunity for Closed Sets
Sort
View
CORR
2007
Springer
98views Education» more  CORR 2007»
14 years 11 months ago
Guarded Hybrid Knowledge Bases
Recently, there has been a lot of interest in the integration of Description Logics and rules on the Semantic Web. We define guarded hybrid knowledge bases (or g-hybrid knowledge...
Stijn Heymans, Jos de Bruijn, Livia Predoiu, Crist...
CVGIP
2007
136views more  CVGIP 2007»
14 years 11 months ago
Contour-based surface reconstruction using MPU implicit models
This paper presents a technique for creating a smooth, closed surface from a set of 2D contours, which have been extracted from a 3D scan. The technique interprets the pixels that...
Ilya Braude, Jeffrey Marker, Ken Museth, Jonathan ...
JMM2
2006
133views more  JMM2 2006»
14 years 11 months ago
An Adaptive Method for Image Recovery in the DFT Domain
In image authentication research, a common approach is to divide a given image into a number of smaller blocks, and embed a fragile watermark into each block. The modifications can...
Peining Tao, Ahmet M. Eskicioglu
KAIS
2006
111views more  KAIS 2006»
14 years 11 months ago
Real-time classification of variable length multi-attribute motions
Multi-attribute motion data can be generated in many applications/ devices, such as motion capture devices and animations. It can have dozens of attributes, thousands of rows, and ...
Chuanjun Li, Latifur Khan, Balakrishnan Prabhakara...
LMCS
2006
79views more  LMCS 2006»
14 years 11 months ago
Computably Based Locally Compact Spaces
tract Stone Duality) is a re-axiomatisation of general topology in which the topology on a space is treated, not as an infinitary lattice, but as an exponential object of the same...
Paul Taylor 0002