Sciweavers

2801 search results - page 429 / 561
» On the Adequateness of the Connection Method
Sort
View
CHI
2010
ACM
15 years 4 months ago
Evaluation of progressive image loading schemes
Although network bandwidth has increased dramatically, high-resolution images often take several seconds to load, and considerably longer on mobile devices over wireless connectio...
Chris Harrison, Anind K. Dey, Scott E. Hudson
SAC
2010
ACM
15 years 4 months ago
Seal object detection in document images using GHT of local component shapes
Due to noise, overlapped text/signature and multi-oriented nature, seal (stamp) object detection involves a difficult challenge. This paper deals with automatic detection of seal ...
Partha Pratim Roy, Umapada Pal, Josep Lladó...
AINA
2009
IEEE
15 years 4 months ago
Multi-node Processing for Asymmetrical Communications in Underwater Acoustic Networks
— Underwater acoustic communication networks have attracted attention for its applications in many areas such as mine warfare, rapid environmental assessment or search and rescue...
Antonio Silva, Julien Huillery, Sergio M. Jesus
CVPR
2009
IEEE
15 years 4 months ago
Trajectory parsing by cluster sampling in spatio-temporal graph
The objective of this paper is to parse object trajectories in surveillance video against occlusion, interruption, and background clutter. We present a spatio-temporal graph (ST-G...
Xiaobai Liu, Liang Lin, Song Chun Zhu, Hai Jin
PLDI
2009
ACM
15 years 4 months ago
GC assertions: using the garbage collector to check heap properties
This paper introduces GC assertions, a system interface that programmers can use to check for errors, such as data structure invariant violations, and to diagnose performance prob...
Edward Aftandilian, Samuel Z. Guyer