Sciweavers

2230 search results - page 327 / 446
» Reformulating Constraint Models Using Input Data
Sort
View
NIPS
2007
14 years 11 months ago
People Tracking with the Laplacian Eigenmaps Latent Variable Model
Reliably recovering 3D human pose from monocular video requires models that bias the estimates towards typical human poses and motions. We construct priors for people tracking usi...
Zhengdong Lu, Miguel Á. Carreira-Perpi&ntil...
BROADNETS
2006
IEEE
15 years 3 months ago
A Flexible Advance Reservation Model for Multi-Domain WDM Optical Networks
— Advance reservation is a mechanism to guarantee the availability of resources when they are needed. In the context of LambdaGrid, this mechanism is used to provide data-intensi...
Eric He, Xi Wang, Jason Leigh
TAICPART
2006
IEEE
144views Education» more  TAICPART 2006»
15 years 3 months ago
Testing the Implementation of Business Rules Using Intensional Database Tests
One of the key roles of any information system is to enforce the business rules and policies set by the owning organisation. As for any important functionality, it is necessary to...
David Willmor, Suzanne M. Embury
EMS
2009
IEEE
15 years 4 months ago
Accurate Timeliness Simulations for Real-Time Wireless Sensor Networks
—The use of wireless sensor networks is rapidly growing in various types of applications that benefit from spatially distributed data collection. Some of these applications, suc...
Jérôme Rousselot, Jean-Dominique Deco...
ACSAC
2003
IEEE
15 years 1 months ago
Bayesian Event Classification for Intrusion Detection
Intrusion detection systems (IDSs) attempt to identify attacks by comparing collected data to predefined signatures known to be malicious (misuse-based IDSs) or to a model of lega...
Christopher Krügel, Darren Mutz, William K. R...