Sciweavers

415 search results - page 45 / 83
» Intruders pattern identification
Sort
View
ICIP
2008
IEEE
15 years 6 months ago
Creating a face model from an unknown skull based on the tissue map
The craniofacial reconstruction is employed as an initialization of the identification in forensics. In this paper we present a tissue map based craniofacial reconstruction techni...
Yuru Pei, Hongbin Zha, Zhongbiao Yuan
ICVGIP
2004
15 years 1 months ago
A Framework for Activity Recognition and Detection of Unusual Activities
In this paper we present a simple framework for activity recognition based on a model of multi-layered finite state machines, built on top of a low level image processing module f...
Dhruv Mahajan, Nipun Kwatra, Sumit Jain, Prem Kalr...
WIRTSCHAFTSINFORMATI
2007
15 years 1 months ago
Optimized Dynamic Allocation Management for ERP Systems and Enterprise Services
To ensure the operability and reliability of large scale Enterprise Resource Planning Systems (ERP) and enterprise services, a peak-load oriented hardware sizing is often used, wh...
Valentin Nicolescu, Martin Wimmer, Raphael Geissle...
ECCV
2004
Springer
16 years 1 months ago
Tracking Aspects of the Foreground against the Background
In object tracking, change of object aspect is a cause of failure due to significant changes of object appearances. The paper proposes an approach to this problem without a priori ...
Hieu Tat Nguyen, Arnold W. M. Smeulders
VLSID
2007
IEEE
154views VLSI» more  VLSID 2007»
16 years 8 days ago
Application Specific Datapath Extension with Distributed I/O Functional Units
Performance of an application can be improved through augmenting the processor with Application specific Functional Units (AFUs). Usually a cluster of operations identified from th...
Nagaraju Pothineni, Anshul Kumar, Kolin Paul