Sciweavers

1050 search results - page 88 / 210
» Two methods of authenticated positioning
Sort
View
KBSE
2009
IEEE
15 years 8 months ago
Alattin: Mining Alternative Patterns for Detecting Neglected Conditions
—To improve software quality, static or dynamic verification tools accept programming rules as input and detect their violations in software as defects. As these programming rul...
Suresh Thummalapenta, Tao Xie
ICCV
2007
IEEE
15 years 8 months ago
3-D Metric Reconstruction and Registration of Images of Near-planar Surfaces
In this study, we address the problem of 3-D dense metric reconstruction and registration from multiple images, given that the observed surface is nearly planar. This is difficult...
Tae Eun Choe, Gérard G. Medioni
NIPS
2007
15 years 3 months ago
Structured Learning with Approximate Inference
In many structured prediction problems, the highest-scoring labeling is hard to compute exactly, leading to the use of approximate inference methods. However, when inference is us...
Alex Kulesza, Fernando Pereira
CMIG
2010
110views more  CMIG 2010»
14 years 9 months ago
Unsupervised SVM-based gridding for DNA microarray images
This paper presents a novel method for unsupervised DNA microarray gridding based on Support Vector Machines (SVMs). Each spot is a small region on the microarray surface where cha...
Dimitris G. Bariamis, Dimitris Maroulis, Dimitrios...
ICIP
2005
IEEE
16 years 3 months ago
Tracking multiple cells by correspondence resolution in a sequential Bayesian framework
We propose a multi-target tracking (MTT) algorithm in a sequential Bayesian framework that computes cell velocities from video microscopy. Unlike the traditional tracking methods,...
Nilanjan Ray, Gang Dong, Scott T. Acton