Sciweavers

1050 search results - page 171 / 210
» A Trainable System for Object Detection
Sort
View
ACSAC
2003
IEEE
15 years 3 months ago
Automated Analysis for Digital Forensic Science: Semantic Integrity Checking
When computer security violations are detected, computer forensic analysts attempting to determine the relevant causes and effects are forced to perform the tedious tasks of find...
Tye Stallard, Karl N. Levitt
ISMAR
2003
IEEE
15 years 3 months ago
Fully Automated and Stable Registration for Augmented Reality Applications
We present a fully automated approach to camera registration for Augmented Reality systems. It relies on purely passive vision techniques to solve the initialization and realtime ...
Vincent Lepetit, Luca Vacchetti, Daniel Thalmann, ...
76
Voted
IPPS
2002
IEEE
15 years 2 months ago
Compiler-Directed I/O Optimization
Despite continued innovations in design of I/O systems, I/O performance has not kept pace with the progress in processor and communication technology. This paper addresses this I/...
Mahmut T. Kandemir, Alok N. Choudhary
86
Voted
GECCO
2010
Springer
194views Optimization» more  GECCO 2010»
15 years 2 months ago
Fitting multi-planet transit models to photometric time-data series by evolution strategies
In this paper we present the application of an evolution strategy to the problem of detecting multi-planet transit events in photometric time-data series. Planetary transits occur...
Andreas M. Chwatal, Günther R. Raidl, Michael...
HUC
2009
Springer
15 years 2 months ago
Sonar-based measurement of user presence and attention
We describe a technique to detect the presence of computer users. This technique relies on sonar using hardware that already exists on commodity laptop computers and other electro...
Stephen P. Tarzia, Robert P. Dick, Peter A. Dinda,...