Sciweavers

773 search results - page 109 / 155
» On Cryptographic Assumptions and Challenges
Sort
View
CISIS
2009
IEEE
15 years 8 months ago
Ontology-Based Generation of Bayesian Networks
Bayesian networks are indispensable for determining the probability of events which are influenced by various components. Bayesian probabilities encode degrees of belief about ce...
Stefan Fenz, A. Min Tjoa, Marcus Hudec
CVPR
2009
IEEE
15 years 8 months ago
Non-rigid 2D-3D pose estimation and 2D image segmentation
In this work, we present a non-rigid approach to jointly solve the tasks of 2D-3D pose estimation and 2D image segmentation. In general, most frameworks which couple both pose est...
Romeil Sandhu, Samuel Dambreville, Anthony J. Yezz...
TACAS
2009
Springer
122views Algorithms» more  TACAS 2009»
15 years 8 months ago
Test Input Generation for Programs with Pointers
Software testing is an essential process to improve software quality in practice. Researchers have proposed several techniques to automate parts of this process. In particular, sym...
Dries Vanoverberghe, Nikolai Tillmann, Frank Piess...
ICASSP
2009
IEEE
15 years 8 months ago
Efficacy of a constantly adaptive language modeling technique for web-scale applications
In this paper, we describe CALM, a method for building statistical language models for the Web. CALM addresses several unique challenges dealing with the Web contents. First, CALM...
Kuansan Wang, Xiaolong Li
ICRA
2009
IEEE
162views Robotics» more  ICRA 2009»
15 years 8 months ago
SLAM in large indoor environments with low-cost, noisy, and sparse sonars
— Simultaneous localization and mapping (SLAM) is a well-studied problem in mobile robotics. However, the majority of the proposed techniques for SLAM rely on the use of accurate...
Teddy N. Yap Jr., Christian R. Shelton