Sciweavers

80 search results - page 10 / 16
» On the Complexity of Real Root Isolation
Sort
View
ICCV
2011
IEEE
13 years 10 months ago
End-to-end Scene Text Recognition
This paper focuses on the problem of word detection and recognition in natural images. The problem is significantly more challenging than reading text in scanned documents, and h...
Kai Wang, Boris Babenko, Serge Belongie
ASPLOS
2012
ACM
13 years 5 months ago
Path-exploration lifting: hi-fi tests for lo-fi emulators
Processor emulators are widely used to provide isolation and instrumentation of binary software. However they have proved difficult to implement correctly: processor specificati...
Lorenzo Martignoni, Stephen McCamant, Pongsin Poos...
SIAMNUM
2010
87views more  SIAMNUM 2010»
14 years 4 months ago
A Note on the Computation of All Zeros of Simple Quaternionic Polynomials
Polynomials with quaternionic coefficients located on only one side of the powers (we call them simple polynomials) may have two different types of zeros: isolated and spherical ze...
Drahoslava Janovská, Gerhard Opfer
ICETE
2004
204views Business» more  ICETE 2004»
14 years 11 months ago
A Real-Time Intrusion Prevention System for Commercial Enterprise Databases
: - Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural ba...
Ulf T. Mattsson
ENTCS
2006
113views more  ENTCS 2006»
14 years 10 months ago
A Large-Scale Experiment in Executing Extracted Programs
It is a well-known fact that algorithms are often hidden inside mathematical proofs. If these proofs are formalized inside a proof assistant, then a mechanism called extraction ca...
Luís Cruz-Filipe, Pierre Letouzey