Sciweavers

415 search results - page 45 / 83
» Intruders pattern identification
Sort
View
ICIP
2008
IEEE
15 years 4 months ago
Creating a face model from an unknown skull based on the tissue map
The craniofacial reconstruction is employed as an initialization of the identification in forensics. In this paper we present a tissue map based craniofacial reconstruction techni...
Yuru Pei, Hongbin Zha, Zhongbiao Yuan
ICVGIP
2004
14 years 11 months ago
A Framework for Activity Recognition and Detection of Unusual Activities
In this paper we present a simple framework for activity recognition based on a model of multi-layered finite state machines, built on top of a low level image processing module f...
Dhruv Mahajan, Nipun Kwatra, Sumit Jain, Prem Kalr...
WIRTSCHAFTSINFORMATI
2007
14 years 11 months ago
Optimized Dynamic Allocation Management for ERP Systems and Enterprise Services
To ensure the operability and reliability of large scale Enterprise Resource Planning Systems (ERP) and enterprise services, a peak-load oriented hardware sizing is often used, wh...
Valentin Nicolescu, Martin Wimmer, Raphael Geissle...
ECCV
2004
Springer
15 years 11 months ago
Tracking Aspects of the Foreground against the Background
In object tracking, change of object aspect is a cause of failure due to significant changes of object appearances. The paper proposes an approach to this problem without a priori ...
Hieu Tat Nguyen, Arnold W. M. Smeulders
VLSID
2007
IEEE
154views VLSI» more  VLSID 2007»
15 years 10 months ago
Application Specific Datapath Extension with Distributed I/O Functional Units
Performance of an application can be improved through augmenting the processor with Application specific Functional Units (AFUs). Usually a cluster of operations identified from th...
Nagaraju Pothineni, Anshul Kumar, Kolin Paul