Sciweavers

2351 search results - page 364 / 471
» A Method of Requirement Inconsistency Analysis
Sort
View
TSMC
2010
14 years 4 months ago
Can You See Me Now? Sensor Positioning for Automated and Persistent Surveillance
Most existing camera placement algorithms focus on coverage and/or visibility analysis, which ensures that the object of interest is visible in the camera's field of view (FOV...
Yi Yao, Chung-Hao Chen, Besma R. Abidi, David L. P...
CVPR
2012
IEEE
13 years 12 days ago
Laser speckle photography for surface tampering detection
It is often desirable to detect whether a surface has been touched, even when the changes made to that surface are too subtle to see in a pair of before and after images. To addre...
Yi-Chang Shih, Abe Davis, Samuel W. Hasinoff, Fr&e...
MM
2005
ACM
146views Multimedia» more  MM 2005»
15 years 3 months ago
Unsupervised content discovery in composite audio
Automatically extracting semantic content from audio streams can be helpful in many multimedia applications. Motivated by the known limitations of traditional supervised approache...
Rui Cai, Lie Lu, Alan Hanjalic
ICFCA
2004
Springer
15 years 3 months ago
BLID: An Application of Logical Information Systems to Bioinformatics
BLID (Bio-Logical Intelligent Database) is a bioinformatic system designed to help biologists extract new knowledge from raw genome data by providing high-level facilities for both...
Sébastien Ferré, Ross D. King
OOPSLA
2004
Springer
15 years 3 months ago
Transparent proxies for java futures
A proxy object is a surrogate or placeholder that controls access to another target object. Proxies can be used to support distributed programming, lazy or parallel evaluation, ac...
Polyvios Pratikakis, Jaime Spacco, Michael W. Hick...