Sciweavers

5948 search results - page 927 / 1190
» Computing Robust Counter-Strategies
Sort
View
GI
2004
Springer
15 years 9 months ago
Reliability study of an embedded operating system for industrial applications
: Critical industrial applications or fault tolerant applications need for operating systems (OS) which guarantee a correct and safe behaviour despite the appearance of errors. In ...
Juan Pardo, José Carlos Campelo, Juan Jos&e...
ICA
2004
Springer
15 years 9 months ago
Nonlinear Postprocessing for Blind Speech Separation
Abstract. Frequency domain ICA has been used successfully to separate the utterances of interfering speakers in convolutive environments, see e.g. [6],[7]. Improved separation resu...
Dorothea Kolossa, Reinhold Orglmeister
ICIAR
2004
Springer
15 years 9 months ago
Camera Calibration Using Two Concentric Circles
We present a simple calibration method for computing the extrinsic parameters (pose) and intrinsic parameters (focal length and principal point) of a camera by imaging a pattern of...
Francisco Abad, Emilio Camahort, Roberto Viv&oacut...
IMR
2004
Springer
15 years 9 months ago
Surface Mesh Projection for Hexahedral Mesh Generation by Sweeping
Sweep method is one of the most robust techniques to generate hexahedral meshes in extrusion volumes. One of the main issues to be dealt by any sweep algorithm is the projection o...
Xevi Roca, Josep Sarrate, Antonio Huerta
IWCM
2004
Springer
15 years 9 months ago
Tracking Complex Objects Using Graphical Object Models
We present a probabilistic framework for component-based automatic detection and tracking of objects in video. We represent objects as spatio-temporal two-layer graphical models, w...
Leonid Sigal, Ying Zhu, Dorin Comaniciu, Michael J...