Sciweavers

940 search results - page 121 / 188
» Local rely-guarantee reasoning
Sort
View
CGF
2006
191views more  CGF 2006»
15 years 25 days ago
A Robust Two-Step Procedure for Quad-Dominant Remeshing
We propose a new technique for quad-dominant remeshing which separates the local regularity requirements from the global alignment requirements by working in two steps. In the fir...
Martin Marinov, Leif Kobbelt
ENTCS
2006
172views more  ENTCS 2006»
15 years 24 days ago
Efficient Detection of Conflicts in Graph-based Model Transformation
Using graph transformation as a formalism to specify model transformation, termination and confluence of the graph transformation system are often required properties. Only under ...
Leen Lambers, Hartmut Ehrig, Fernando Orejas
109
Voted
JCIT
2008
103views more  JCIT 2008»
15 years 23 days ago
Implementation of Filter Reverse Search System based on Spatial Relationships of Filters
Firewall is a useful technique that ensures network security. Firewall examines network packets and determines whether to accept or deny them based on an ordered set of filters. I...
Yi Yin, Kazuaki Hida, Yoshiaki Katayama, Naohisa T...
97
Voted
CVPR
2009
IEEE
16 years 7 months ago
Directed Assistance for Ink-Bleed Reduction in Old Documents
Ink-bleed interference is a serious problem that affects the legibility of old documents. Ink-bleed can be reduced reasonably well using pixel classification based on user supplie...
Zheng Lu, Zheng Wu, Michael S. Brown
88
Voted
CVPR
2004
IEEE
16 years 2 months ago
Efficient Tracking with the Bounded Hough Transform
The Bounded Hough Transform is introduced to track objects in a sequence of sparse range images. The method is based upon a variation of the General Hough Transform that exploits ...
Michael A. Greenspan, Limin Shang, Piotr Jasiobedz...