Sciweavers

4798 search results - page 30 / 960
» A Time for Change
Sort
View
SP
1996
IEEE
101views Security Privacy» more  SP 1996»
15 years 2 months ago
An Immunological Approach to Change Detection: Algorithms, Analysis and Implications
We present new results on a distributable changedetection method inspired by the natural immune system. A weakness in the original algorithm was the exponential cost of generating...
Patrik D'haeseleer, Stephanie Forrest, Paul Helman
ICCV
1998
IEEE
16 years 11 days ago
Wormholes in Shape Space: Tracking Through Discontinuous Changes in Shape
Existing object tracking algorithms generally use some form of local optimisation, assuming that an object's position and shape change smoothly over time. In some situations ...
Tony Heap, David Hogg
ICCV
1998
IEEE
16 years 11 days ago
A Framework for Modeling Appearance Change in Image Sequences
Image "appearance" may change over time due to a variety of causes such as 1) object or camera motion; 2) generic photometric events including variations in illumination...
Michael J. Black, David J. Fleet, Yaser Yacoob
109
Voted
ISSRE
2010
IEEE
14 years 9 months ago
Change Bursts as Defect Predictors
—In software development, every change induces a risk. What happens if code changes again and again in some period of time? In an empirical study on Windows Vista, we found that ...
Nachiappan Nagappan, Andreas Zeller, Thomas Zimmer...
88
Voted
CHI
2004
ACM
15 years 10 months ago
Unintended effects: varying icon spacing changes users' visual search strategy
Users of modern GUIs routinely engage in visual searches for various control items, such as buttons and icons. Because this is so ubiquitous, it is important that the visual prope...
Sarah P. Everett, Michael D. Byrne