Sciweavers

1795 search results - page 56 / 359
» Search by strategy
Sort
View
ICASSP
2008
IEEE
15 years 4 months ago
Abnormal event detection based on trajectory clustering by 2-depth greedy search
Clustering-based approaches for abnormal video event detection have been proven to be effective in the recent literature. Based on the framework proposed in our previous work [1],...
Fan Jiang, Ying Wu, Aggelos K. Katsaggelos
PSTV
1992
113views Hardware» more  PSTV 1992»
14 years 11 months ago
Coverage Preserving Reduction Strategies for Reachability Analysis
We study the effect of three new reduction strategies for conventional reachability analysis, as used in automated protocol validation algorithms. The first two strategies are imp...
Gerard J. Holzmann, Patrice Godefroid, Didier Piro...
KBSE
1995
IEEE
15 years 1 months ago
A Transformation System for Interactive Reformulation of Design Optimization Strategies
Numerical design optimization algorithms are highly sensitive to the particular formulation of the optimization problems they are given. The formulation of the search space, the o...
Thomas Ellman, John Keane, Takahiro Murata, Mark S...
AIIDE
2008
15 years 2 days ago
The Rise of Potential Fields in Real Time Strategy Bots
Bots for Real Time Strategy (RTS) games are challenging to implement. A bot controls a number of units that may have to navigate in a partially unknown environment, while at the s...
Johan Hagelbäck, Stefan J. Johansson
CHI
2007
ACM
15 years 10 months ago
A minimal model for predicting visual search in human-computer interaction
Visual search is an important part of human-computer interaction. It is critical that we build theory about how people visually search displays in order to better support the user...
Tim Halverson, Anthony J. Hornof