Sciweavers

4985 search results - page 193 / 997
» Observation of String-Rewriting Systems
Sort
View
111
Voted
INFORMATICALT
2000
101views more  INFORMATICALT 2000»
15 years 3 months ago
Closed-loop Robust Identification Using the Indirect Approach
In the previous paper (Pupeikis, 2000) the problem of closed-loop robust identification using the direct approach in the presence of outliers in observations have been considered. ...
Rimantas Pupeikis
103
Voted
BIRTHDAY
2010
Springer
15 years 1 months ago
Tracking Evidence
In this case study we describe an approach to a general logical framework for tracking evidence within epistemic contexts. We consider as basic an example which features two justi...
Sergei N. Artëmov
199
Voted
CVPR
2011
IEEE
14 years 10 months ago
Stable Multi-Target Tracking in Real-Time Surveillance Video
The majority of existing pedestrian trackers concentrate on maintaining the identities of targets, however systems for remote biometric analysis or activity recognition in surveill...
Ben Benfold and Ian Reid
176
Voted
WACV
2012
IEEE
13 years 11 months ago
Dynamic and invisible messaging for visual MIMO
The growing ubiquity of cameras in hand-held devices and the prevalence of electronic displays in signage creates a novel framework for wireless communications. Traditionally, the...
Wenjia Yuan, Kristin J. Dana, Ashwin Ashok, Marco ...
131
Voted
LISA
2004
15 years 5 months ago
Solaris Zones: Operating System Support for Consolidating Commercial Workloads
Server consolidation, which allows multiple workloads to run on the same system, has become increasingly important as a way to improve the utilization of computing resources and r...
Daniel Price, Andrew Tucker