Sciweavers

1508 search results - page 176 / 302
» A Toolbox of Level Set Methods
Sort
View
143
Voted
ACSAC
2002
IEEE
15 years 8 months ago
Networking in The Solar Trust Model: Determining Optimal Trust Paths in a Decentralized Trust Network
The Solar Trust Model provides a method by which the sender of a message can be authenticated, and the level of trust that can be placed in the sender of the message or the messag...
Michael Clifford
103
Voted
CLUSTER
2002
IEEE
15 years 8 months ago
Supermon: A High-Speed Cluster Monitoring System
Supermon is a flexible set of tools for high speed, scalable cluster monitoring. Node behavior can be monitored much faster than with other commonly used methods (e.g., rstatd). ...
Matthew J. Sottile, Ronald Minnich
121
Voted
ICPR
2010
IEEE
15 years 8 months ago
Symbol Classification Using Dynamic Aligned Shape Descriptor
Shape representation is a difficult task because of several symbol distortions, such as occlusions, elastic deformations, gaps or noise. In this paper, we propose a new descriptor ...
Alicia Fornés, Sergio Escalera, Josep Llados, Ern...
144
Voted
DEXAW
1999
IEEE
176views Database» more  DEXAW 1999»
15 years 8 months ago
Windsurf: Region-Based Image Retrieval Using Wavelets
In this paper we present WINDSURF (Wavelet-Based Indexing of Images Using Region Fragmentation), a new approach to content-based image retrieval. The method uses the wavelet trans...
Stefania Ardizzoni, Ilaria Bartolini, Marco Patell...
115
Voted
AGENTS
1999
Springer
15 years 8 months ago
Where to Look? Automating Attending Behaviors of Virtual Human Characters
This research proposes a computational framework for generating visual attending behavior in an embodied simulated human agent. Such behaviors directly control eye and head motion...
Sonu Chopra-Khullar, Norman I. Badler