Sciweavers

16070 search results - page 55 / 3214
» Identifying
Sort
View
135
Voted
ICMCS
2007
IEEE
134views Multimedia» more  ICMCS 2007»
15 years 10 months ago
Identifying Source Cell Phone using Chromatic Aberration
Chromatic aberration is the phenomenon where lights of different wavelengths fail to converge at the same position on the focal plane. There are two kinds of chromatic aberration:...
Tran Van Lanh, Sabu Emmanuel, Mohan S. Kankanhalli
ICRA
2007
IEEE
115views Robotics» more  ICRA 2007»
15 years 10 months ago
Identifying the Failure-Tolerant Workspace Boundaries of a Kinematically Redundant Manipulator
— In addition to possessing a number of other important properties, kinematically redundant manipulators are inherently more tolerant to locked-joint failures than nonredundant m...
Rodney G. Roberts, Rodrigo S. Jamisola, Anthony A....
141
Voted
IPPS
2007
IEEE
15 years 10 months ago
Identifying and Addressing Uncertainty in Architecture-Level Software Reliability Modeling
Assessing reliability at early stages of software development, such as at the level of software architecture, is desirable and can provide a cost-effective way of improving a soft...
Leslie Cheung, Leana Golubchik, Nenad Medvidovic, ...
135
Voted
ICMCS
2006
IEEE
197views Multimedia» more  ICMCS 2006»
15 years 9 months ago
Identify Sports Video Shots with "Happy" or "Sad" Emotions
Semantic video content extraction and selection are critical steps in sports video analysis and editing. The identification of video segments can be from various semantic perspec...
Jinjun Wang, Engsiong Chng, Changsheng Xu, Hanqing...
116
Voted
NDSS
2005
IEEE
15 years 9 months ago
A Black-Box Tracing Technique to Identify Causes of Least-Privilege Incompatibilities
Most Windows users run all the time with Admin privileges. This significantly increases the vulnerability of Windows systems because the compromise of any user-level application ...
Shuo Chen, John Dunagan, Chad Verbowski, Yi-Min Wa...