We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 43 results
  1. An efficient approach for image de-fencing based on conditional generative adversarial network

    Automated image de-fencing is an important area of computer vision that deals with the problem of virtually removing fence structures, if any, from...

    Utkarsh Mishra, Akshat Agrawal, ... Pratik Chattopadhyay in Signal, Image and Video Processing
    Article 15 April 2022
  2. A robust and efficient image de-fencing approach using conditional generative adversarial networks

    Image de-fencing is one of the most important aspects of recreational photography in which the objective is to remove the fence texture present in an...

    Divyanshu Gupta, Shorya Jain, ... Lipo Wang in Signal, Image and Video Processing
    Article 30 July 2020
  3. Kmclib: Automated Inference and Verification of Session Types from OCaml Programs

    Theories and tools based on multiparty session types offer correctness guarantees for concurrent programs that communicate using message-passing....
    Keigo Imai, Julien Lange, Rumyana Neykova in Tools and Algorithms for the Construction and Analysis of Systems
    Conference paper Open access 2022
  4. Semi-supervised Learning to Remove Fences from a Single Image

    When taking photos in the outdoors, e.g., playgrounds, gardens and zoos, fences are often inevitable to interfere with the perception of the...
    Wei Shang, Pengfei Zhu, Dongwei Ren in Pattern Recognition and Computer Vision
    Conference paper 2020
  5. Contestations in urban mobility: rights, risks, and responsibilities for Urban AI

    Cities today are dynamic urban ecosystems with evolving physical, socio-cultural, and technological infrastructures. Many contestations arise from...

    Nitin Sawhney in AI & SOCIETY
    Article Open access 04 July 2022
  6. Amplify Supplements

    Amplify is not just limited to these core features which we have discussed in previous chapters – there are also a number of supplementary services...
    Akshat Paul, Mahesh Haldar in Serverless Web Applications with AWS Amplify
    Chapter 2023
  7. Integrated animal monitoring system with animal detection and classification capabilities: a review on image modality, techniques, applications, and challenges

    The continuous monitoring of animals is crucial for the well-being of both humans and animals. A comprehensive animal monitoring system must...

    N. Sundaram, S. Divya Meena in Artificial Intelligence Review
    Article 20 June 2023
  8. Aspects of Industrial Applications of Collaborative Robots

    In the automotive industry robots are widely used in the entire range of the production. In most cases, the isolation of the robots from human...
    Peter Zentay, Lajos Kutrovacz, ... Tibor Szalay in Modern Problems of Robotics
    Conference paper 2021
  9. SAP S/4HANA on Google Cloud – Concepts and Architecture

    Google launched the Google Cloud Platform with the first service called App Engine in preview in April 2008. Two years later, Google Cloud Storage...
    André Bögelsack, Utpal Chakraborty, ... Elena Wolz in SAP S/4HANA Systems in Hyperscaler Clouds
    Chapter 2022
  10. Removing fences from sweep motion videos using global 3D reconstruction and fence-aware light field rendering

    Diminishing the appearance of a fence in an image is a challenging research area due to the characteristics of fences (thinness, lack of texture,...

    Chanya Lueangwattana, Shohei Mori, Hideo Saito in Computational Visual Media
    Article Open access 08 April 2019
  11. Demystifying the challenges and benefits of analyzing user-reported logs in bug reports

    Logs in bug reports provide important debugging information for developers. During the debugging process, developers need to study the bug report and...

    An Ran Chen, Tse-Hsun (Peter) Chen, Shaowei Wang in Empirical Software Engineering
    Article 12 January 2021
  12. Automated Modular Verification for Relaxed Communication Protocols

    Ensuring software correctness and safety for communication-centric programs is important but challenging. In this paper we introduce a solution for...
    Andreea Costea, Wei-Ngan Chin, ... Florin Craciun in Programming Languages and Systems
    Conference paper 2018
  13. Theses on the Future Design of Human-Robot Collaboration

    For the future design of Human-Robot Collaboration (HRC), further developments in a multitude of disciplines and research areas are required. In this...
    Hans-Jürgen Buxbaum, Sumona Sen, Ruth Häusler in Human-Computer Interaction. Multimodal and Natural Interaction
    Conference paper 2020
  14. Data Flow Analysis of Asynchronous Systems using Infinite Abstract Domains

    Asynchronous message-passing systems are employed frequently to implement distributed mechanisms, protocols, and processes. This paper addresses the...
    Snigdha Athaiya, Raghavan Komondoor, K. Narayan Kumar in Programming Languages and Systems
    Conference paper Open access 2021
  15. A Security Evaluation of Industrial Radio Remote Controllers

    Heavy industrial machinery is a primary asset for the operation of key sectors such as construction, manufacturing, and logistics. Targeted attacks...
    Federico Maggi, Marco Balduzzi, ... Rainer Vosseler in Detection of Intrusions and Malware, and Vulnerability Assessment
    Conference paper 2019
  16. A comprehensive study of automatic video summarization techniques

    Video summarization deals with the generation of a condensed version of the original video by including meaningful frames or segments while...

    Deeksha Gupta, Akashdeep Sharma in Artificial Intelligence Review
    Article 13 March 2023
  17. The Digital Underground Economy

    It could be suggested that the dangers we have encountered so far were relatively harmless. But now we dive deep into the underground and find the...
    Eddy Willems in Cyberdanger
    Chapter 2019
  18. Deep Learning Based Fence Segmentation and Removal from an Image Using a Video Sequence

    Conventional approaches to image de-fencing use multiple adjacent frames for segmentation of fences in the reference image and are limited to...
    Sankaraganesh Jonna, Krishna K. Nakka, Rajiv R. Sahay in Computer Vision – ECCV 2016 Workshops
    Conference paper 2016
  19. Debugging Concurrent Software: Advances and Challenges

    Concurrency debugging is an extremely important yet challenging problem that has been hampering developer productivity and software reliability in...

    Jeff Huang, Charles Zhang in Journal of Computer Science and Technology
    Article 09 September 2016
  20. Provisioning Smart City Infrastructure

    Realizing IoT Cloud systems in practice is a challenging endeavor, especially when it comes to provisioning large-scale systems with highly...
    Schahram Dustdar, Stefan Nastić, Ognjen Šćekić in Smart Cities
    Chapter 2017
Did you find what you were looking for? Share feedback.