Sciweavers

466 search results - page 66 / 94
» Representation and Computation of Boolean Combinations of Sc...
Sort
View
ICCV
2007
IEEE
16 years 1 months ago
Rotational Motion Deblurring of a Rigid Object from a Single Image
Most previous motion deblurring methods restore the degraded image assuming a shift-invariant linear blur filter. These methods are not applicable if the blur is caused by spatial...
Qi Shan, Wei Xiong, Jiaya Jia
CVPR
2008
IEEE
15 years 6 months ago
Learning a geometry integrated image appearance manifold from a small training set
While low-dimensional image representations have been very popular in computer vision, they suffer from two limitations: (i) they require collecting a large and varied training se...
Yilei Xu, Amit K. Roy Chowdhury
CI
2000
114views more  CI 2000»
14 years 11 months ago
A Guided Tour through Some Extensions of the Event Calculus
Kowalski and Sergot's Event Calculus (EC) is a simple temporal formalism that, given a set of event occurrences, derives the maximal validity intervals (MVIs) over which prop...
Iliano Cervesato, Massimo Franceschet, Angelo Mont...
CSCLP
2008
Springer
15 years 1 months ago
An Efficient Decision Procedure for Functional Decomposable Theories Based on Dual Constraints
Abstract. Over the last decade, first-order constraints have been efficiently used in the artificial intelligence world to model many kinds of complex problems such as: scheduling,...
Khalil Djelloul
CCS
2007
ACM
15 years 6 months ago
Topological analysis of network attack vulnerability
: To understand overall vulnerability to network attack, one must consider attacker exploits not just in isolation, but also in combination. That is, one must analyze how low-level...
Sushil Jajodia