Sciweavers

448 search results - page 40 / 90
» The Light of Existence
Sort
View
ICDS
2009
IEEE
15 years 6 months ago
An Iterative Method to Design Traffic Flow Models
Existing traffic flow modeling theory lacks of guidelines to construct traffic flow models from scratch. In addition, traffic flow models are mainly analyzed with computer simulat...
Juan Manuel González-Calleros, Jorge Mart&i...
ICRA
2009
IEEE
248views Robotics» more  ICRA 2009»
15 years 6 months ago
Comparison of surface normal estimation methods for range sensing applications
— As mobile robotics is gradually moving towards a level of semantic environment understanding, robust 3D object recognition plays an increasingly important role. One of the most...
Klaas Klasing, Daniel Althoff, Dirk Wollherr, Mart...
ICDE
2008
IEEE
125views Database» more  ICDE 2008»
15 years 6 months ago
On breaching enterprise data privacy through adversarial information fusion
— Data privacy is one of the key challenges faced by enterprises today. Anonymization techniques address this problem by sanitizing sensitive data such that individual privacy is...
Srivatsava Ranjit Ganta, Raj Acharya
AVSS
2007
IEEE
15 years 6 months ago
Towards robust face recognition for Intelligent-CCTV based surveillance using one gallery image
In recent years, the use of Intelligent Closed-Circuit Television (ICCTV) for crime prevention and detection has attracted significant attention. Existing face recognition system...
Ting Shan, Shaokang Chen, Conrad Sanderson, Brian ...
DASFAA
2007
IEEE
266views Database» more  DASFAA 2007»
15 years 6 months ago
Compatibility Analysis and Mediation-Aided Composition for BPEL Services
In Service Oriented Architecture (SOA), the need for inter-service compatibility analysis has gone beyond what existing service composition/ verification approaches can handle. Giv...
Wei Tan, Fangyan Rao, Yushun Fan, Jun Zhu