Sciweavers

1663 search results - page 283 / 333
» Privacy and Identity Management
Sort
View
IVC
2006
171views more  IVC 2006»
14 years 11 months ago
Motion detection and tracking using belief indicators for an automatic visual-surveillance system
A motion detection and tracking algorithm for human and car activity surveillance is presented and evaluated by using the Pets'2000 test sequence. Proposed approach uses a te...
Cina Motamed
SIGCSE
2008
ACM
132views Education» more  SIGCSE 2008»
14 years 11 months ago
A case study of retention practices at the University of Illinois at Urbana-Champaign
Computer science is seeing a decline in enrollment at all levels of education. One key strategy for reversing this decline is to improve methods of student retention. This paper, ...
Tanya L. Crenshaw, Erin W. Chambers, Heather Metca...
KES
2010
Springer
14 years 10 months ago
Visualization and Language Processing for Supporting Analysis across the Biomedical Literature
Finding relevant publications in the large and rapidly growing body of biomedical literature is challenging. Search queries on PubMed often return thousands of publications and it ...
Carsten Görg, Hannah J. Tipney, Karin Verspoo...
ICEBE
2009
IEEE
118views Business» more  ICEBE 2009»
14 years 9 months ago
Temporal Exception Prediction for Loops in Resource Constrained Concurrent Workflows
Workflow management systems (WfMS) are widely used for improving business processes and providing better quality of services. However, rapid changes in business environment can ca...
Iok-Fai Leong, Yain-Whar Si
ICOODB
2009
163views Database» more  ICOODB 2009»
14 years 9 months ago
Mapping XSD to OO Schemas
This paper presents algorithms that make it possible to process XML data that conforms to XML Schema (XSD) in a mainstream object-oriented programming language. These algorithms a...
Suad Alagic, Philip A. Bernstein