Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Aliasing (computing)

Known as: Alias, Alias (computing), Strict aliasing 
In computing, aliasing describes a situation in which a data location in memory can be accessed through different symbolic names in the program. Thus… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Recovering fine-scale surface shapes is a challenging task in computer vision. Multispectral photometric stereo is one of the… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2010
Highly Cited
2010
We propose a robust interpolation scheme for aliased regularly sampled seismic data that uses the curvelet transform. In a first… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2007
Highly Cited
2007
There are numerous methods for interpolating uniformly sampled, aliased seismic data, but few can handle the combination of… Expand
  • figure 2
  • figure 1
  • figure 4
  • figure 6
  • figure 9
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Super-resolution algorithms reconstruct a high-resolution image from a set of low-resolution images of a scene. Precise alignment… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Compilers can make good use of knowledge about the shape of data structures and the values that pointers assume during execution… Expand
  • figure 2
  • figure 3
  • figure 4
  • figure 7
  • figure 11
Is this relevant?
Highly Cited
2004
Highly Cited
2004
We present a general theory of topological maps whereby sensory input, topological and local metrical information are combined to… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
ion has, however, been compromised by the aliasing, and accidental side-effects can leak into the calling contexts, exposing… Expand
  • figure 16.1
  • figure 37.3
Is this relevant?
2000
2000
It is essential for security to be able to isolate mistrusting programs from one another, and to protect the host platform from… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
1996
1996
subprograms cannot be called. In order to use a program which has been declared abstract, the type for which the subprogram is… Expand
Is this relevant?
1988
1988
Adaptive filtering in subbands, that is adapting several short filters in parallel on subsampled frequency subbands, is an… Expand
Is this relevant?