Sciweavers

1933 search results - page 228 / 387
» Query Containment Using Views
Sort
View
ICIP
2010
IEEE
15 years 1 months ago
People identification using shadow dynamics
People identification has numerous applications, ranging from surveillance/security to robotics. Face and body movement/gait biometrics are the most important tools for this task....
Yumi Iwashita, Adrian Stoica, Ryo Kurazume
ICCD
1995
IEEE
109views Hardware» more  ICCD 1995»
15 years 6 months ago
Verifying the performance of the PCI local bus using symbolic techniques
Symbolic model checking is a successful technique for checking properties of large finite-state systems. This method has been used to verify a number of real-world hardware desig...
Sérgio Vale Aguiar Campos, Edmund M. Clarke...
129
Voted
ATAL
2008
Springer
15 years 5 months ago
Using organization knowledge to improve routing performance in wireless multi-agent networks
Multi-agent systems benefit greatly from an organization design that guides agents in determining when to communicate, how often, with whom, with what priority, and so on. However...
Huzaifa Zafar, Victor R. Lesser, Daniel D. Corkill...
125
Voted
ICCAD
2004
IEEE
191views Hardware» more  ICCAD 2004»
16 years 6 days ago
Checking consistency of C and Verilog using predicate abstraction and induction
edicate Abstraction and Induction Edmund Clarke Daniel Kroening June 25, 2004 CMU-CS-04-131 School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 It is common...
Daniel Kroening, Edmund M. Clarke
ETRA
2008
ACM
235views Biometrics» more  ETRA 2008»
15 years 5 months ago
Using semantic content as cues for better scanpath prediction
Under natural viewing conditions, human observers use shifts in gaze to allocate processing resources to subsets of the visual input. There are many computational models that try ...
Moran Cerf, E. Paxon Frady, Christof Koch