Sciweavers

945 search results - page 93 / 189
» Graph Types
Sort
View
158
Voted
ACCV
2010
Springer
14 years 9 months ago
Modeling Sense Disambiguation of Human Pose: Recognizing Action at a Distance by Key Poses
Abstract. We propose a methodology for recognizing actions at a distance by watching the human poses and deriving descriptors that capture the motion patterns of the poses. Human p...
Snehasis Mukherjee, Sujoy Kumar Biswas, Dipti Pras...
WWW
2001
ACM
16 years 3 months ago
Batch rekeying for secure group communications
Many emerging web and Internet applications are based on a group communications model. Thus, securing group communications is an important Internet design issue. The key graph app...
Xiaozhou (Steve) Li, Yang Richard Yang, Mohamed G....
135
Voted
FAST
2009
15 years 4 days ago
Story Book: An Efficient Extensible Provenance Framework
Most application provenance systems are hard coded for a particular type of system or data, while current provenance file systems maintain in-memory provenance graphs and reside i...
Richard P. Spillane, Russell Sears, Chaitanya Yala...
WCRE
1993
IEEE
15 years 6 months ago
Flexible Control for Program Recognition
Recognizing commonly used data structures and algorithms is a key activity in reverse engineering. Systems developed to automate this recognition process have been isolated, stand...
Linda M. Wills
89
Voted
CHI
1994
ACM
15 years 6 months ago
Multitrees: enriching and reusing hierarchical structure
This paper introduces multitrees, a new type of structure for representing information. Multitrees are a class of directed acyclic graphs (DAGs) with the unusual property that the...
George W. Furnas, Jeff Zacks