Dense Scale Selection Over Space, Time, and Space-Time
نویسندگان
چکیده
منابع مشابه
Dense scale selection over space, time and space-time
Scale selection methods based on local extrema over scale of scale-normalized derivatives have been primarily developed to be applied sparsely — at image points where the magnitude of a scale-normalized differential expression additionally assumes local extrema over the domain where the data are defined. This paper presents a methodology for performing dense scale selection, so that hypotheses ...
متن کاملInterest Point Detection and Scale Selection in Space-Time
Several types of interest point detectors have been proposed for spatial images. This paper investigates how this notion can be generalised to the detection of interesting events in space-time data. Moreover, we develop a mechanism for spatio-temporal scale selection and detect events at scales corresponding to their extent in both space and time. To detect spatio-temporal events, we build on t...
متن کاملExtreme-scale space-time parallelism
D. Ruprecht∗, R. Speck†∗, M. Emmett‡, M. Bolten§ R. Krause∗, ∗Institute of Computational Science, Università della Svizzera italiana, Lugano, Switzerland. Email: {daniel.ruprecht, rolf.krause}@usi.ch †Jülich Supercomputing Centre, Jülich, Germany. Email: [email protected] ‡Lawrence Berkeley National Laboratory, Berkeley, USA. Email: [email protected] § Department of Mathematics and Science, ...
متن کاملTime-Dependent Real-Space Renormalization Group Method
In this paper, using the tight-binding model, we extend the real-space renormalization group method to time-dependent Hamiltonians. We drive the time-dependent recursion relations for the renormalized tight-binding Hamiltonian by decimating selective sites of lattice iteratively. The formalism is then used for the calculation of the local density of electronic states for a one dimensional quant...
متن کاملTime and Space Complexity Reduction of a Cryptanalysis Algorithm
Binary Decision Diagram (in short BDD) is an efficient data structure which has been used widely in computer science and engineering. BDD-based attack in key stream cryptanalysis is one of the best forms of attack in its category. In this paper, we propose a new key stream attack which is based on ZDD(Zero-suppressed BDD). We show how a ZDD-based key stream attack is more efficient in time and ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: SIAM Journal on Imaging Sciences
سال: 2018
ISSN: 1936-4954
DOI: 10.1137/17m114892x