Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for ''
published presentations and documents on DocSlides.
Object recognition (part 2)
by kittie-lecroy
CSE P 576. Larry Zitnick (. larryz@microsoft.com....
Improving Application Security with Data Flow Assertions
by alida-meadow
Yip, X. Wang, N. . Zeldovich. , M. F. . Kaashoek....
Entertainment in Museums:
by joedanone
A way forward-combining elements of the . Etruscan...
Abnormal Object Detection
by trish-goza
by. Canonical . Scene. -based Contextual Model. S...
Request Scheduling for Multiactive Objects
by pasty-toler
Student Justine Rochas. Supervisor Ludovic Henr...
Programming Multiple Devices
by debby-jeon
Instructor Notes. This lecture describes the diff...
Playing Around with CAS:
by natalie
Techniques for . Choosing . Therapy Targets and Ac...
Chap 2 Perception-approaches:
by ceila
Gestalt. , Bottom-Up (feature analysis, . template...
Art in the Age of Imperialism
by mjnt
What is Art?. For most . of art history, an artist...
Framing the objects of desire: limits and opportunities in the management of sexual risk in the con
by cheryl-pisano
Paper presented at the 4. th. Congress of the In...
HookScout: Proactive Binary-Centric
by min-jolicoeur
Hook Detection. Heng. Yin, . Pongsin. . Poosank...
Deep Predictive Model for Autonomous Driving
by lois-ondreau
Wongun. Choi. Scene Type. City. Image classifica...
HookScout:
by tatiana-dople
Proactive Binary-Centric . Hook Detection. Heng. ...
Blender
by jane-oiler
API:. Part 1: Overview. Roger Wickes. rogerwickes...
Jolt:
by myesha-ticknor
Reducing Object Churn. AJ Shankar. , Matt Arnold,...
Context-based Detection of Privacy Violation
by min-jolicoeur
Bharat . Bhargava. In collaboration with Mark Lin...
Load More...