Skip to main content

previous disabled Page of 2
and
  1. Article

    Open Access

    Hierarchical registration method for surface quality inspection of long products

    Manufacturing industry often uses 3D scanning technologies to inspect their products. Some of these techniques produce a point cloud that represent a section of the manufactured product. The clouds must be ali...

    F. J. delaCalle, D. F. García, R. Usamentiaga, P. Nuño, L. Magadán in The Visual Computer (2024)

  2. No Access

    Article

    Fast data-independent KLT approximations based on integer functions

    The Karhunen-Loève transform (KLT) stands as a well-established discrete transform, demonstrating optimal characteristics in data decorrelation and dimensionality reduction. Its ability to condense energy comp...

    A. P. Radunz, D. F. G. Coelho, F. M. Bayer in Multimedia Tools and Applications (2024)

  3. Article

    Open Access

    Regularising Inverse Problems with Generative Machine Learning Models

    Deep neural network approaches to inverse imaging problems have produced impressive results in the last few years. In this survey paper, we consider the use of generative models in a variational regularisation...

    M. A. G. Duff, N. D. F. Campbell in Journal of Mathematical Imaging and Vision (2024)

  4. No Access

    Article

    The Radial Point Interpolation Method combined with a bi-directional structural topology optimization algorithm

    Projecting reduced-weight components with increased performance is a continuous engineering challenge, especially in the aircraft industry, where fuel consumption, emissions, and performance are highly depende...

    D. C. Gonçalves, J. D. F. Lopes, R. D. S. G. Campilho in Engineering with Computers (2022)

  5. No Access

    Article

    Cost-effective learning-based strategies for test case prioritization in continuous integration of highly-configurable software

    Highly-Configurable Software (HCSs) testing is usually costly, as a significant number of variants need to be tested. This becomes more problematic when Continuous Integration (CI) practices are adopted. CI le...

    Jackson A. Prado Lima, Willian D. F. Mendonça in Empirical Software Engineering (2022)

  6. Article

    Open Access

    A simulator for both manual and powered wheelchairs in immersive virtual reality CAVE

    A large number of people in the world need to use a wheelchair because of different disabilities. Driving a wheelchair requires complex physical and cognitive abilities which need to be trained. Virtual traini...

    C. Genova, E. Biffi, S. Arlati, D. F. Redaelli, A. Prini, M. Malosio in Virtual Reality (2022)

  7. Article

    Open Access

    CNN-based framework using spatial drop** for enhanced interpretation of neural activity in motor imagery classification

    Interpretation of brain activity responses using motor imagery (MI) paradigms is vital for medical diagnosis and monitoring. Assessed by machine learning techniques, identification of imagined actions is hinde...

    D. F. Collazos-Huertas, A. M. Álvarez-Meza, C. D. Acosta-Medina in Brain Informatics (2020)

  8. No Access

    Article

    A Generative Model of Cognitive State from Task and Eye Movements

    The early eye tracking studies of Yarbus provided descriptive evidence that an observer’s task influences patterns of eye movements, leading to the tantalizing prospect that an observer’s intentions could be i...

    W. Joseph MacInnes, Amelia R. Hunt, Alasdair D. F. Clarke in Cognitive Computation (2018)

  9. No Access

    Article

    Recognizing individuals in groups in outdoor environments combining stereo vision, RFID and BLE

    Vision-based people localization systems in outdoor environments can be enhanced by means of radio frequency identification technologies. This combination has the potential to enable a wide range of new applic...

    D. F. Llorca, R. Quintero, I. Parra, M. A. Sotelo in Cluster Computing (2017)

  10. No Access

    Article

    Design of function-oriented microcontrollers on equipment of programmable logic integrated circuits for embedded systems

    New approaches to develo** hardware of embedded microprocessor control systems that reduce their design labor-intensiveness, the classification of function oriented microcontrollers was implemented, a tool c...

    A. E. Vasil’ev, T. Yu. Ivanova, T. D. F. Cabezas in Automatic Control and Computer Sciences (2015)

  11. No Access

    Article

    Automatic LightBeam Controller for driver assistance

    In this article, we present an effective system for detecting vehicles in front of a camera-assisted vehicle (preceding vehicles traveling in the same direction and oncoming vehicles traveling in the opposite ...

    P. F. Alcantarilla, L. M. Bergasa, P. Jiménez, I. Parra in Machine Vision and Applications (2011)

  12. No Access

    Article

    Optical behavior of some nanosized structures formed due to laser irradiation

    With the help of laser method the metal nanoparticle suspensions (Ag, Zn, V) and diamond carbon films were formed. The effective size of metal nanoparticles in liquid media was defined due to the method of las...

    V. K. Goncharov, D. F. Ismailov, K. V. Kozadayev in Optical Memory and Neural Networks (2007)

  13. No Access

    Article

    Utilization Bounds for EDF Scheduling on Real-Time Multiprocessor Systems

    The utilization bound for earliest deadline first (EDF) scheduling is extended from uniprocessors to homogeneous multiprocessor systems with partitioning strategies. First results are provided for a basic task...

    J. M. López, J. L. Díaz, D. F. García in Real-Time Systems (2004)

  14. No Access

    Article

    Local Multichannel Deconvolution

    We introduce a method to locally restore multiple blurred images that yields an extended boundary of the restored image. In particular, we provide a method for finding solutions that are compactly (finitely) s...

    G.R. Easley, D.F. Walnut in Journal of Mathematical Imaging and Vision (2003)

  15. No Access

    Article

    Utilization Bounds for Multiprocessor Rate-Monotonic Scheduling

    In this paper, we extend Liu and Layland's utilization bound for fixed priority scheduling on uniprocessors to homogeneous multiprocessor systems under a partitioning strategy. Assuming that tasks are pre-empt...

    J. M. López, M. García, J. L. Díaz, D. F. García in Real-Time Systems (2003)

  16. No Access

    Article

    Asymptotic expansions of moments and cumulants

    This paper shows how procedures for computing moments and cumulants may themselves be computed from a few elementary identities.

    D. F. Andrews in Statistics and Computing (2001)

  17. No Access

    Article

    Innovation indicators in science and technology evaluation: Comments from a higher education point of view

    D. F. Westerheijden in Scientometrics (1999)

  18. No Access

    Article

    Digital boundary tracking

    In many three-dimensional imaging applications, the three-dimensional space is represented by an array of cubical volume elements (voxels) and a subset of the voxels is specified by some property. Objects in t...

    G. T. Herman, D. F. Robinson in Pattern Analysis and Applications (1998)

  19. No Access

    Article

    The effort required by LCSAJ testing: an assessment via a new path generation strategy

    In general, LCSAJ testing more thoroughly exercises the control structure of a piece of software than does either statement or branch testing. Despite this, the exceptionally small number of papers which detai...

    D. F. Yates, N. Malevris in Software Quality Journal (1995)

  20. No Access

    Article

    Probabilistic analysis of a grou** algorithm

    We study thegrou** by swap** problem, which occurs in memory compaction and in computing the exponential of a matrix. In this problem we are given a sequence ofn numbers drawn from {0,1, 2,...,m−1} with repet...

    D. F. Wong, Edward M. Reingold in Algorithmica (1991)

previous disabled Page of 2