Sciweavers

1460 search results - page 186 / 292
» Meeting people where they are
Sort
View
TCSV
2002
124views more  TCSV 2002»
14 years 11 months ago
Efficient moving object segmentation algorithm using background registration technique
An efficient moving object segmentation algorithm suitable for real-time content-based multimedia communication systems is proposed in this paper. First, a background registration ...
Shao-Yi Chien, Shyh-Yih Ma, Liang-Gee Chen
VLDB
2002
ACM
122views Database» more  VLDB 2002»
14 years 11 months ago
Lightweight Flexible Isolation for Language-based Extensible Systems
Safe programming languages encourage the development of dynamically extensible systems, such as extensible Web servers and mobile agent platforms. Although protection is of utmost...
Laurent Daynès, Grzegorz Czajkowski
SIGMOD
2008
ACM
129views Database» more  SIGMOD 2008»
14 years 11 months ago
TerraServer and the Russia adventure..
Jim Gray made many friends and few enemies in his career. Many of the projects he worked on were inspired by one or more of his friends and collaborators in industry and academia....
Tom Barclay
FOCM
2010
161views more  FOCM 2010»
14 years 10 months ago
The Asymptotics of Wilkinson's Shift: Loss of Cubic Convergence
One of the most widely used methods for eigenvalue computation is the QR iteration with Wilkinson’s shift: here the shift s is the eigenvalue of the bottom 2 × 2 principal mino...
Ricardo S. Leite, Nicolau C. Saldanha, Carlos Tome...
ICFEM
2010
Springer
14 years 10 months ago
Verifying Heap-Manipulating Programs with Unknown Procedure Calls
Abstract. Verification of programs with invocations to unknown procedures is a practical problem, because in many scenarios not all codes of programs to be verified are available...
Shengchao Qin, Chenguang Luo, Guanhua He, Florin C...