CiteWeb

WorldWeb citation database

Computer Science

Page 84
Maintaining representations of the environment of a mobile robot

A description is given of current ideas related to the problem of building and updating three-dimensional representations of the environment of a mobile robot that uses passive vision as its main sensory modality. The authors attempt to represent both...

Algorithm = logic + control

The notion that computation = controlled deduction was first proposed by Pay Hayes [19] and more recently by Bibel [2] and Vaughn-Pratt [31]. A similar thesis that database systems should be regarded as consisting of a relational component, which defines...

Struck: Structured output tracking with kernels

Adaptive tracking-by-detection methods are widely used in computer vision for tracking arbitrary objects. Current approaches treat the tracking problem as a classification task and use online learning techniques to update the object model. However, for...

A large-scale hierarchical multi-view RGB-D object dataset

Over the last decade, the availability of public image repositories and recognition benchmarks has enabled rapid progress in visual object category and instance detection. Today we are witnessing the birth of a new generation of sensing technologies capable...

Optimal Energy Savings in Cellular Access Networks

In this paper we study with simple analytical models the energy-aware management of cellular access networks, trying to characterize the amount of energy that can be saved by reducing the number of active cells during the periods when they are not necessary...

Scene completion using millions of photographs

What can you do with a million images? In this paper we present a new image completion algorithm powered by a huge database of photographs gathered from the Web. The algorithm patches up holes in images by finding similar image regions in the database...

Anomaly detection of web-based attacks

Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect known web-based attacks, misuse detection systems are equipped with a large number of signatures. Unfortunately, it is difficult...

Statistical Timing Analysis Considering Spatial Correlations using a Single Pert-Like Traversal

We present an efficient statistical timing analysis algorithm thatpredicts the probability distribution of the circuit delay while incorporatingthe effects of spatial correlations of intra-die parametervariations, using a method based on principal component...

Effects of adjective orientation and gradability on sentence subjectivity

Subjectivity is a pragmatic, sentence-level feature that has important implications for text processing applications such as information extraction and information retrieval. We study the effects of dynamic adjectives, semantically oriented adjectives,...

ConGolog , a concurrent programming language based on the situation calculus

As an alternative to planning, an approach to high-level agent control based on concurrent program execution is considered. A formal definition in the situation calculus of such a programming language is presented and illustrated with some examples. The...

Certificate revocation and certificate update

We present a solution for the problem of certificate revocation. This solution represents certificate revocation lists by authenticated dictionaries that support: (1) efficient verification whether a certificate is in the list or not and (2) efficient...

Statistical texture characterization from discrete wavelet representations

We conjecture that texture can be characterized by the statistics of the wavelet detail coefficients and therefore introduce two feature sets: (1) the wavelet histogram signatures which capture all first order statistics using a model based approach and...

Power minimization in IC design: principles and applications

Low power has emerged as a principal theme in today's electronics industry. The need for low power has caused a major paradigm shift in which power dissipation is as important as performance and area. This article presents an in-depth survey of CAD methodologies...

Structural matching in computer vision using probabilistic relaxation

In this paper, we develop the theory of probabilistic relaxation for matching features extracted from 2D images, derive as limiting cases the various heuristic formulae used by researchers in matching problems, and state the conditions under which they...

S-Shaped Reliability Growth Modeling for Software Error Detection

This paper investigates a stochastic model for a software error detection process in which the growth curve of the number of detected software errors for the observed data is S-shaped. The software error detection model is a nonhomogeneous Poisson process...

« Prev.
First ... 78 79 80 81 82 83 84

© 2016-2018 CiteWeb.info — WorldWeb citation database

Up ↑