Sciweavers

130 search results - page 14 / 26
» The Semantics of Scheme Control-Flow Analysis
Sort
View
MTA
2007
113views more  MTA 2007»
14 years 11 months ago
A framework for a video analysis tool for suspicious event detection
This paper proposes a framework to aid video analysts in detecting suspicious activity within the tremendous amounts of video data that exists in today’s world of omnipresent su...
Gal Lavee, Latifur Khan, Bhavani M. Thuraisingham
TC
2008
14 years 11 months ago
Deferrable Scheduling for Maintaining Real-Time Data Freshness: Algorithms, Analysis, and Results
The periodic update transaction model has been used to maintain the freshness (or temporal validity) of real-time data. Period and deadline assignment has been the main focus of pa...
Ming Xiong, Song Han, Kam-yiu Lam, Deji Chen
101
Voted
LCPC
2000
Springer
15 years 3 months ago
Optimizing the Use of High Performance Software Libraries
Abstract. This paper describes how the use of software libraries, which is prevalent in high performance computing, can benefit from compiler optimizations in much the same way tha...
Samuel Z. Guyer, Calvin Lin
139
Voted
ICIP
2001
IEEE
16 years 1 months ago
Tube-embodied gradient vector flow fields for unsupervised video object plane (VOP) segmentation
In this paper constrained Gradient Vector Flow (GVF) field generation is performed, for fast and accurate unsupervised stereoscopic semantic segmentation. The scheme utilizes the ...
Anastasios D. Doulamis, Nikolaos D. Doulamis, Stef...
ESWS
2008
Springer
15 years 1 months ago
The Principle of Self-Description: Identity Through Linking
Abstract. If one wants to have a scheme for identifying non-Web accessible entities, should it be centralized or decentralized? Given a URI, how can one tell if it refers to a web ...
Harry Halpin