Sciweavers

1906 search results - page 310 / 382
» Dependable Self-Hosting Distributed Systems Using Constraint...
Sort
View
VLDB
2005
ACM
140views Database» more  VLDB 2005»
15 years 10 months ago
Loadstar: Load Shedding in Data Stream Mining
In this demo, we show that intelligent load shedding is essential in achieving optimum results in mining data streams under various resource constraints. The Loadstar system intro...
Yun Chi, Haixun Wang, Philip S. Yu
ECCV
2010
Springer
15 years 8 months ago
Automatic Learning of Background Semantics in Generic Surveilled Scenes
Advanced surveillance systems for behavior recognition in outdoor traffic scenes depend strongly on the particular configuration of the scenario. Scene-independent trajectory analy...
Carles Fernández, Jordi Gonzàlez, Xavier Roca
VEE
2006
ACM
126views Virtualization» more  VEE 2006»
15 years 10 months ago
A new approach to real-time checkpointing
The progress towards programming methodologies that simplify the work of the programmer involves automating, whenever possible, activities that are secondary to the main task of d...
Antonio Cunei, Jan Vitek
SIGSOFT
2005
ACM
16 years 5 months ago
Facilitating software evolution research with kenyon
Software evolution research inherently has several resourceintensive logistical constraints. Archived project artifacts, such as those found in source code repositories and bug tr...
Jennifer Bevan, E. James Whitehead Jr., Sunghun Ki...
CVPR
2003
IEEE
16 years 6 months ago
Illumination Normalization with Time-dependent Intrinsic Images for Video Surveillance
Cast shadows produce troublesome effects for video surveillance systems, typically for object tracking from a fixed viewpoint, since it yields appearance variations of objects dep...
Yasuyuki Matsushita, Ko Nishino, Katsushi Ikeuchi,...