Sciweavers

2834 search results - page 466 / 567
» Representing Trees with Constraints
Sort
View
105
Voted
MM
2006
ACM
119views Multimedia» more  MM 2006»
15 years 6 months ago
Model generation for video-based object recognition
This paper presents a novel approach to object recognition involving a sparse 2D model and matching using video. The model is generated on the basis of geometry and image measurab...
Humera Noor, Shahid H. Mirza, Yaser Sheikh, Amit J...
MM
2006
ACM
134views Multimedia» more  MM 2006»
15 years 6 months ago
Autonomous light air vessels (ALAVs)
Through a defined research process we designed objects that behave and respond in specific ways and are part of a networked system that emphasizes autonomous and flocking behavior...
Jed Berk, Nikhil Mitter
89
Voted
MSWIM
2006
ACM
15 years 6 months ago
Interference-constrained wireless coverage in a protocol model
We present an efficient algorithm to compute the coverage map of a given set of transmitters under interference constraints. That is, we compute the set of points that lie within ...
Prateek R. Kapadia, Om P. Damani
114
Voted
HICSS
2005
IEEE
136views Biometrics» more  HICSS 2005»
15 years 6 months ago
Cournot Equilibrium in Price-Capped Two-Settlement Electricity Markets
Abstract— We compare two alternative mechanisms for capping prices in two-settlement electricity markets. With sufficient lead time and competitive entry opportunities, forward ...
Jian Yao, Bert Willems, Shmuel S. Oren, Ilan Adler
ICAC
2005
IEEE
15 years 6 months ago
Multi-resolution Abnormal Trace Detection Using Varied-length N-grams and Automata
Detection and diagnosis of faults in a large-scale distributed system is a formidable task. Interest in monitoring and using traces of user requests for fault detection has been o...
Guofei Jiang, Haifeng Chen, Cristian Ungureanu, Ke...