Sciweavers

5684 search results - page 1004 / 1137
» Computing with active dendrites
Sort
View
BIRTHDAY
2011
Springer
14 years 4 months ago
Algorithmic Aspects of Risk Management
Abstract. Risk analysis has been used to manage the security of systems for several decades. However, its use has been limited to offline risk computation and manual response. In c...
Ashish Gehani, Lee Zaniewski, K. Subramani
SENSYS
2010
ACM
15 years 2 months ago
Surviving wi-fi interference in low power ZigBee networks
Frequency overlap across wireless networks with different radio technologies can cause severe interference and reduce communication reliability. The circumstances are particularly...
Chieh-Jan Mike Liang, Bodhi Priyantha, Jie Liu, An...
CVPR
2009
IEEE
16 years 11 months ago
Dense saliency-based spatiotemporal feature points for action recognition
Several spatiotemporal feature point detectors have been recently used in video analysis for action recognition. Feature points are detected using a number of measures, namely sali...
Konstantinos Rapantzikos, Stefanos D. Kollias, Yan...
136
Voted
ECCV
2006
Springer
16 years 6 months ago
Conditional Infomax Learning: An Integrated Framework for Feature Extraction and Fusion
The paper introduces a new framework for feature learning in classification motivated by information theory. We first systematically study the information structure and present a n...
Dahua Lin, Xiaoou Tang
ECCV
2002
Springer
16 years 6 months ago
Tracking and Object Classification for Automated Surveillance
In this paper we discuss the issues that need to be resolved before fully automated outdoor surveillance systems can be developed, and present solutions to some of these problems. ...
Omar Javed, Mubarak Shah
« Prev « First page 1004 / 1137 Last » Next »