Sciweavers

3555 search results - page 651 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
ICTAI
1992
IEEE
15 years 5 months ago
Automated Parameter Tuning in Stereo Vision Under Time Constraints
This paper presents a method for tuning parameters under a fixed time constraint for a general binocular stereo-vision algorithm. A major difficulty in stereo vision, as well as i...
Steven R. Schwartz, Benjamin W. Wah
ICCAD
2002
IEEE
141views Hardware» more  ICCAD 2002»
15 years 10 months ago
A hierarchical modeling framework for on-chip communication architectures
— The communication sub-system of complex IC systems is increasingly critical for achieving system performance. Given this, it is important that the on-chip communication archite...
Xinping Zhu, Sharad Malik
LOGCOM
2008
94views more  LOGCOM 2008»
15 years 1 months ago
Preservation of Interpolation Features by Fibring
Fibring is a metalogical constructor that permits to combine different logics by operating on their deductive systems under certain natural restrictions, as for example that the t...
Walter Alexandre Carnielli, João Rasga, Cri...
ICALP
1997
Springer
15 years 5 months ago
Recursive Computational Depth
In the 1980's, Bennett introduced computational depth as a formal measure of the amount of computational history that is evident in an object's structure. In particular,...
James I. Lathrop, Jack H. Lutz
DOCENG
2007
ACM
15 years 5 months ago
A document engineering environment for clinical guidelines
In this paper, we present a document engineering environment for Clinical Guidelines (G-DEE), which are standardized medical documents developed to improve the quality of medical ...
Gersende Georg, Marie-Christine Jaulent