Sciweavers

1525 search results - page 237 / 305
» Matching with Regular Constraints
Sort
View
AOSD
2010
ACM
15 years 6 months ago
Disambiguating aspect-oriented security policies
Many software security policies can be encoded as aspects that identify and guard security-relevant program operations. Bugs in these aspectually-implemented security policies oft...
Micah Jones, Kevin W. Hamlen
CHI
2010
ACM
15 years 6 months ago
Bridging the gap: moving from contextual analysis to design
A typical product development lifecycle for interactive systems starts with contextual analysis to guide system design. The challenge however is in transitioning from findings abo...
Tejinder K. Judge, Carman Neustaedter, Anthony Tan...
CVPR
2009
IEEE
15 years 6 months ago
Image hallucination with feature enhancement
1 Example-based super-resolution recovers missing high frequencies in a magnified image by learning the correspondence between co-occurrence examples at two different resolution le...
Zhiwei Xiong, Xiaoyan Sun, Feng Wu
ICDAR
2009
IEEE
15 years 6 months ago
Robust Recognition of Documents by Fusing Results of Word Clusters
The word error rate of any optical character recognition system (OCR) is usually substantially below its component or character error rate. This is especially true of Indic langua...
Venkat Rasagna, Anand Kumar 0002, C. V. Jawahar, R...
IROS
2009
IEEE
165views Robotics» more  IROS 2009»
15 years 6 months ago
Autonomous altitude estimation of a UAV using a single onboard camera
Abstract— Autonomous estimation of the altitude of an Unmanned Aerial Vehicle (UAV) is extremely important when dealing with flight maneuvers like landing, steady flight, etc. ...
Anoop Cherian, Jonathan Andersh, Vassilios Morella...