Sciweavers

2421 search results - page 339 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
ISVC
2007
Springer
15 years 10 months ago
Tensor Lines in Tensor Fields of Arbitrary Order
This paper presents a method to reduce time complexity of the computation of higher–order tensor lines. The method can be applied to higher–order tensors and the spherical harm...
Mario Hlawitschka, Gerik Scheuermann, Alfred Anwan...
152
Voted
ISMAR
2006
IEEE
15 years 10 months ago
Hybrid tracking algorithms for planar and non-planar structures subject to illumination changes
Augmented Reality (AR) aims to fuse a virtual world and a real one in an image stream. When considering only a vision sensor, it relies on registration techniques that have to be ...
Muriel Pressigout, Éric Marchand
134
Voted
ACSAC
2005
IEEE
15 years 10 months ago
Building Evidence Graphs for Network Forensics Analysis
In this paper, we present techniques for a network forensics analysis mechanism that includes effective evidence presentation, manipulation and automated reasoning. We propose the...
Wei Wang, Thomas E. Daniels
NLDB
2005
Springer
15 years 10 months ago
Named Entity Recognition for Web Content Filtering
Effective Web content filtering is a necessity in educational and workplace environments, but current approaches are far from perfect. We discuss a model for text-based intellige...
José María Gómez Hidalgo, Fra...
ECRTS
2000
IEEE
15 years 9 months ago
Towards validated real-time software
We present a tool for the design and validation of embedded real-time applications. The tool integrates two approaches, the use of the synchronous programming language ESTEREL for...
Valérie Bertin, Michel Poize, Jacques Pulou...