Sciweavers

2421 search results - page 124 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
242
Voted
SCIA
2011
Springer
341views Image Analysis» more  SCIA 2011»
14 years 3 months ago
Interactive Image Segmentation Using Level Sets and Dempster-Shafer Theory of Evidence
Abstract. Variational frameworks based on level set methods are popular for the general problem of image segmentation. They combine different feature channels in an energy minimiz...
Björn Scheuermann, Bodo Rosenhahn
91
Voted
COST
2009
Springer
179views Multimedia» more  COST 2009»
15 years 7 months ago
Illumination Invariant Face Recognition by Non-Local Smoothing
Abstract. Existing face recognition techniques struggle with their performance when identities have to be determined (recognized) based on image data captured under challenging ill...
Vitomir Struc, Nikola Pavesic
99
Voted
ICDE
2010
IEEE
178views Database» more  ICDE 2010»
15 years 29 days ago
Autonomic workload execution control using throttling
— Database Management Systems (DBMSs) are often required to simultaneously process multiple diverse workloads while enforcing business policies that govern workload performance. ...
Wendy Powley, Patrick Martin, Mingyi Zhang, Paul B...
95
Voted
DALT
2008
Springer
15 years 2 months ago
JASDL: A Practical Programming Approach Combining Agent and Semantic Web Technologies
Abstract. Although various ideas for integrating Semantic Web and Agent Programming techniques have appeared in the literature, as yet no practical programming approach has managed...
Thomas Klapiscak, Rafael H. Bordini
114
Voted
ICSE
2001
IEEE-ACM
15 years 5 months ago
A Scenario-Driven Approach to Traceability
Design traceability has been widely recognized as being an integral aspect of software development. In the past years this fact has been amplified due to the increased use of lega...
Alexander Egyed