Sciweavers

225 search results - page 44 / 45
» Design for Constraint Violation Detection in Safety-Critical...
Sort
View
TCSV
2008
107views more  TCSV 2008»
13 years 5 months ago
Person Surveillance Using Visual and Infrared Imagery
This paper presents a methodology for analyzing multimodal and multiperspective systems for person surveillance. Using an experimental testbed consisting of two color and two infra...
Stephen J. Krotosky, Mohan M. Trivedi
EDBT
2010
ACM
208views Database» more  EDBT 2010»
14 years 10 days ago
Stream schema: providing and exploiting static metadata for data stream processing
Schemas, and more generally metadata specifying structural and semantic constraints, are invaluable in data management. They facilitate conceptual design and enable checking of da...
Peter M. Fischer, Kyumars Sheykh Esmaili, Ren&eacu...
SOCIALCOM
2010
13 years 3 months ago
Opinion Summarization in Bengali: A Theme Network Model
Theme network is a semantic network of document specific themes. So far Natural Language Processing (NLP) research patronized much of topic based summarizer system, unable to captu...
Amitava Das, Sivaji Bandyopadhyay
EAAI
2008
113views more  EAAI 2008»
13 years 5 months ago
Airlift mission monitoring and dynamic rescheduling
We describe the Flight Manager Assistant (FMA), a prototype system, designed to support real-time management of airlift operations at the USAF Air Mobility Command (AMC). In curre...
David E. Wilkins, Stephen F. Smith, Laurence A. Kr...
EENERGY
2010
13 years 8 months ago
Energy saving and network performance: a trade-off approach
Power consumption of the Information and Communication Technology sector (ICT) has recently become a key challenge. In particular, actions to improve energy-efficiency of Internet...
Carla Panarello, Alfio Lombardo, Giovanni Schembra...