Sciweavers

1050 search results - page 140 / 210
» A Trainable System for Object Detection
Sort
View
ICDE
2006
IEEE
104views Database» more  ICDE 2006»
15 years 6 months ago
Trusted CVS
The CVS (Concurrent Versions System) software is a popular method for recording modifications to data objects, in addition to concurrent access to data in a multi-user environmen...
Muthuramakrishnan Venkitasubramaniam, Ashwin Macha...
MDM
2009
Springer
299views Communications» more  MDM 2009»
15 years 6 months ago
Aggregate Location Monitoring for Wireless Sensor Networks: A Histogram-Based Approach
Location monitoring systems are used to detect human activities and provide monitoring services, e.g., aggregate queries. In this paper, we consider an aggregate location monitori...
Chi-Yin Chow, Mohamed F. Mokbel, Tian He
IJCV
2007
155views more  IJCV 2007»
14 years 11 months ago
3D Reconstruction by Shadow Carving: Theory and Practical Evaluation
Abstract. Cast shadows are an informative cue to the shape of objects. They are particularly valuable for discovering object’s concavities which are not available from other cues...
Silvio Savarese, Marco Andreetto, Holly E. Rushmei...
ICPR
2004
IEEE
16 years 29 days ago
Stealth Vision for Protecting Privacy
We propose an anonymous video capturing system, called "Stealth Vision", that protects the privacy of objects by fading out their appearance. In order to avoid difficult...
Itaru Kitahara, Kiyoshi Kogure, Norihiro Hagita
ICDE
2005
IEEE
122views Database» more  ICDE 2005»
16 years 1 months ago
Uncovering Database Access Optimizations in the Middle Tier with TORPEDO
A popular architecture for enterprise applications is one of a stateless object-based server accessing persistent data through Object-Relational mapping software. The reported ben...
Bruce E. Martin