Sciweavers

10458 search results - page 1940 / 2092
» Modeling Features at Runtime
Sort
View
BMVC
2010
14 years 10 months ago
Epipolar Constraints for Multiscale Matching
Many recent keypoint detectors associate a local scale (for multiscale detectors) or even a full affine frame (for affine-invariant detectors) to each detected keypoint. Although ...
Bill Triggs, Pashmina Bendale
CORR
2011
Springer
142views Education» more  CORR 2011»
14 years 10 months ago
A Logical Method for Policy Enforcement over Evolving Audit Logs
We present an iterative algorithm for enforcing policies represented in a first-order logic, which can, in particular, express all transmission-related clauses in the HIPAA Priva...
Deepak Garg, Limin Jia, Anupam Datta
JSAC
2011
115views more  JSAC 2011»
14 years 10 months ago
Scalable Cross-Layer Wireless Access Control Using Multi-Carrier Burst Contention
Abstract—The increasing demand for wireless access in vehicular environments (WAVE) supporting a wide range of applications such as traffic safety, surveying, infotainment etc.,...
Bogdan Roman, Ian J. Wassell, Ioannis Chatzigeorgi...
140
Voted
TITS
2011
247views more  TITS 2011»
14 years 10 months ago
Road Detection Based on Illuminant Invariance
—By using an onboard camera, it is possible to detect the free road surface ahead of the ego-vehicle. Road detection is of high relevance for autonomous driving, road departure w...
José M. Álvarez, Antonio M. Lopez
EJC
2010
14 years 10 months ago
Inferencing in Database Semantics
As a computational model of natural language communication, Database Semantics1 (DBS) includes a hearer mode and a speaker mode. For the content to be mapped into language expressi...
Roland Hausser
« Prev « First page 1940 / 2092 Last » Next »