Sciweavers

4752 search results - page 801 / 951
» From computation models to models of provenance: the RWS app...
Sort
View
CHI
2010
ACM
15 years 8 months ago
Prefab: implementing advanced behaviors using pixel-based reverse engineering of interface structure
Current chasms between applications implemented with different user interface toolkits make it difficult to implement and explore potentially important interaction techniques in n...
Morgan Dixon, James Fogarty
ICDCS
2009
IEEE
15 years 8 months ago
Stochastic Multicast with Network Coding
The usage of network resources by content providers is commonly governed by Service Level Agreements (SLA) between the content provider and the network service provider. Resource ...
Ajay Gopinathan, Zongpeng Li
ICRA
2009
IEEE
164views Robotics» more  ICRA 2009»
15 years 8 months ago
Assigning cameras to subjects in video surveillance systems
— We consider the problem of tracking multiple agents moving amongst obstacles, using multiple cameras. Given an environment with obstacles, and many people moving through it, we...
Hazem El-Alfy, David Jacobs, Larry Davis
COMPLEX
2009
Springer
15 years 8 months ago
A Preliminary Study on the Effects of Fear Factors in Disease Propagation
Upon an outbreak of a dangerous infectious disease, people generally tend to reduce their contacts with others in fear of getting infected. Such typical actions apparently help to ...
Yubo Wang, Jie Hu, Gaoxi Xiao, Limsoon Wong, Stefa...
SCALESPACE
2009
Springer
15 years 8 months ago
Momentum Based Optimization Methods for Level Set Segmentation
Abstract. Segmentation of images is often posed as a variational problem. As such, it is solved by formulating an energy functional depending on a contour and other image derived t...
Gunnar Läthén, Thord Andersson, Reiner...