Sciweavers

1377 search results - page 238 / 276
» A bio-inspired system model for interactive surveillance app...
Sort
View
ICDCS
1991
IEEE
15 years 3 months ago
Supporting the development of network programs
of ‘‘network computers’’ is inherently lessAbstract predictable than that of more traditional distributed memory systems, such as hypercubes [22], since both theFor computa...
Bernd Bruegge, Peter Steenkiste
TSE
1998
115views more  TSE 1998»
14 years 11 months ago
Integration and Analysis of Use Cases Using Modular Petri Nets in Requirements Engineering
—It is well known that requirements engineering plays a critical role in software quality. The use case approach is a requirements elicitation technique commonly used in industri...
Woo Jin Lee, Sung Deok Cha, Yong Rae Kwon
SIGIR
2011
ACM
14 years 2 months ago
Mining tags using social endorsement networks
Entities on social systems, such as users on Twitter, and images on Flickr, are at the core of many interesting applications: they can be ranked in search results, recommended to ...
Theodoros Lappas, Kunal Punera, Tamás Sarlo...
CVPR
2007
IEEE
16 years 1 months ago
Shadow Removal in Front Projection Environments Using Object Tracking
When an occluding object, such as a person, stands between a projector and a display surface, a shadow results. We can compensate by positioning multiple projectors so they produc...
Samuel Audet, Jeremy R. Cooperstock
VR
2009
IEEE
188views Virtual Reality» more  VR 2009»
15 years 6 months ago
Crafting Personalized Facial Avatars Using Editable Portrait and Photograph Example
Computer-generated facial avatars have been increasingly used in a variety of virtual reality applications. Emulating the real-world face sculpting process, we present an interact...
Tanasai Sucontphunt, Zhigang Deng, Ulrich Neumann