Results 321 to 330 of about 15,552,862 (368)
Some of the next articles are maybe not open access.

End-to-End Object Detection with Transformers

European Conference on Computer Vision, 2020
We present a new method that views object detection as a direct set prediction problem. Our approach streamlines the detection pipeline, effectively removing the need for many hand-designed components like a non-maximum suppression procedure or anchor ...
Nicolas Carion   +5 more
semanticscholar   +1 more source

ByteTrack: Multi-Object Tracking by Associating Every Detection Box

European Conference on Computer Vision, 2021
Multi-object tracking (MOT) aims at estimating bounding boxes and identities of objects in videos. Most methods obtain identities by associating detection boxes whose scores are higher than a threshold.
Yifu Zhang   +7 more
semanticscholar   +1 more source

Detecting overflow detection

Proceedings of the 2nd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis - CODES+ISSS '04, 2004
Fixed-point saturating arithmetic is widely used in media and digital signal processing applications. A number of processor architectures provide instructions that implement saturating operations. However, standard high-level languages, such as ANSI C, provide no direct support for saturating arithmetic.
Vladimir Kotlyar, Mayan Moudgill
openaire   +1 more source

Death detective

Science, 2021
A veterinarian traces how animals die, finding new threats to people and wildlife.
openaire   +2 more sources

Microbial detection

Biosensors and Bioelectronics, 1996
There is a widespread need for commercial instrumentation for the rapid and inexpensive detection of microbial contamination of food, industrial waste water and clinical samples. A large number of detection methods have been developed utilizing the optical, electrochemical, biochemical and physical properties of microorganisms.
N S, Hobson, I, Tothill, A P, Turner
openaire   +2 more sources

Renaming Detection

Automated Software Engineering, 2000
Finding changed identifiers in programs is important for program comparison and merging. Comparing two versions of a program is complicated if renaming has occurred. Textual merging is highly unreliable if, in one version, identifiers were renamed, while in the other version, code using the old identifiers was added or modified.
Malpohl, Guido   +2 more
openaire   +1 more source

Detecting the Detective

ANQ: A Quarterly Journal of Short Articles, Notes and Reviews, 1999
(1999). Detecting the Detective. ANQ: A Quarterly Journal of Short Articles, Notes and Reviews: Vol. 12, No. 3, pp. 44-55.
openaire   +1 more source

YOLOv10: Real-Time End-to-End Object Detection

Neural Information Processing Systems
Over the past years, YOLOs have emerged as the predominant paradigm in the field of real-time object detection owing to their effective balance between computational cost and detection performance.
Ao Wang   +6 more
semanticscholar   +1 more source

Detection before Detection

2007
Those critics who take an encyclopaedic approach to crime fiction customarily cite among the sources of the genre two episodes from Genesis in the first book of the Bible, which can be read as the religious foundation myth of Western society. It is because of a crime — although in religious terms it is the ‘original sin’ — that Adam and Eve abandon the
openaire   +1 more source

Ovulation Detection

Endocrinology and Metabolism Clinics of North America, 1992
Despite major achievements in elucidating many details of the physiologic processes of human reproduction during the past 2 decades, a simple, reliable, and inexpensive method for the prediction and detection of the time of ovulation is still not available.
openaire   +2 more sources

Home - About - Disclaimer - Privacy