Sciweavers

2989 search results - page 498 / 598
» Using Domain-Independent Problems for Introducing Formal Met...
Sort
View
ICCV
2011
IEEE
13 years 10 months ago
Segmentation Fusion for Connectomics
We address the problem of automatic 3D segmentation of a stack of electron microscopy sections of brain tissue. Unlike previous efforts, where the reconstruction is usually done o...
Amelio Vazquez-Reina, Michael Gelbart, Daniel Huan...
ICCV
2011
IEEE
13 years 10 months ago
Scene Recognition and Weakly Supervised Object Localization with Deformable Part-Based Models
Weakly supervised discovery of common visual structure in highly variable, cluttered images is a key problem in recognition. We address this problem using deformable part-based mo...
Megha Pandey, Svetlana Lazebnik
EUSFLAT
2007
156views Fuzzy Logic» more  EUSFLAT 2007»
14 years 11 months ago
Fuzzy Calculating and Fuzzy Control in Wireless Sensor Network
At present time configurable wireless sensor networks are given special consideration. Wireless sensor networks are now a static elements union. To make such a network a powerful ...
Irina Kalganova
TC
1998
14 years 9 months ago
Abstraction Techniques for Validation Coverage Analysis and Test Generation
ion Techniques for Validation Coverage Analysis and Test Generation Dinos Moundanos, Jacob A. Abraham, Fellow, IEEE, and Yatin V. Hoskote —The enormous state spaces which must be...
Dinos Moundanos, Jacob A. Abraham, Yatin Vasant Ho...
CCS
2008
ACM
14 years 12 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung