Sciweavers

9888 search results - page 331 / 1978
» Active Algorithm Selection
Sort
View
144
Voted
ICPP
2007
IEEE
15 years 10 months ago
VIRE: Active RFID-based Localization Using Virtual Reference Elimination
RFID technologies are gaining much attention as they are attractive solutions to many application domains. Localization based on active RFID technologies provides a much needed ad...
Yiyang Zhao, Yunhao Liu, Lionel M. Ni
IPCCC
2007
IEEE
15 years 10 months ago
SpyCon: Emulating User Activities to Detect Evasive Spyware
The success of any spyware is determined by its ability to evade detection. Although traditional detection methodologies employing signature and anomaly based systems have had rea...
Madhusudhanan Chandrasekaran, Vidyaraman Vidyarama...
129
Voted
CVPR
2006
IEEE
15 years 10 months ago
Active Graph Cuts
This paper adds a number of novel concepts into global s/t cut methods improving their efficiency and making them relevant for a wider class of applications in vision where algor...
Olivier Juan, Yuri Boykov
167
Voted
ISORC
2006
IEEE
15 years 10 months ago
JAAT: Java Alias Analysis Tool for Program Maintenance Activities
Alias analysis is a method for extracting sets of expressions which may possibly refer to the same memory locations during program execution. Although many researchers have alread...
Fumiaki Ohata, Katsuro Inoue
MLMI
2005
Springer
15 years 9 months ago
Automatic Speech Recognition and Speech Activity Detection in the CHIL Smart Room
Abstract. An important step to bring speech technologies into wide deployment as a functional component in man-machine interfaces is to free the users from close-talk or desktop mi...
Stephen M. Chu, Etienne Marcheret, Gerasimos Potam...