Sciweavers

2351 search results - page 377 / 471
» A Method of Requirement Inconsistency Analysis
Sort
View
PTS
2007
120views Hardware» more  PTS 2007»
14 years 11 months ago
Towards Systematic Signature Testing
: The success and the acceptance of intrusion detection systems essentially depend on the accuracy of their analysis. Inaccurate signatures strongly trigger false alarms. In practi...
Sebastian Schmerl, Hartmut König
ENTCS
2006
172views more  ENTCS 2006»
14 years 10 months ago
Efficient Detection of Conflicts in Graph-based Model Transformation
Using graph transformation as a formalism to specify model transformation, termination and confluence of the graph transformation system are often required properties. Only under ...
Leen Lambers, Hartmut Ehrig, Fernando Orejas
ICCV
2009
IEEE
16 years 2 months ago
A linear formulation of shape from specular flow
When a curved mirror-like surface moves relative to its environment, it induces a motion field—or specular flow— on the image plane that observes it. This specular flow is r...
Guillermo D. Canas, Yuriy Vasilyev, Yair Adato, To...
CVPR
2008
IEEE
16 years 22 days ago
Accurate Eye Center Location and Tracking Using Isophote Curvature
The ubiquitous application of eye tracking is precluded by the requirement of dedicated and expensive hardware, such as infrared high definition cameras. Therefore, systems based s...
Roberto Valenti, Theo Gevers
CVPR
1999
IEEE
15 years 12 months ago
Independent Motion: The Importance of History
We consider a problem central in aerial visual surveillance applications { detection and tracking of small, independently moving objects in long and noisy video sequences. We dire...
Robert Pless, Tomás Brodský, Yiannis...