Sciweavers

3318 search results - page 341 / 664
» The Weak Instance Model
Sort
View
HICSS
2000
IEEE
135views Biometrics» more  HICSS 2000»
15 years 9 months ago
The IT Performance Evaluation in the Construction Industry
To date there has been limited published work in the construction management and engineering literature that has provided empirical evidence to demonstrate that IT can improve org...
Heng Li, Zahir Irani, Peter E. D. Love
135
Voted
EUROCRYPT
1999
Springer
15 years 9 months ago
A Note on the Limits of Collusion-Resistant Watermarks
In one proposed use of digital watermarks, the owner of a document D sells slightly different documents, D1 , D2 , . . . to each buyer; if a buyer posts his/her document Di to the...
Funda Ergün, Joe Kilian, Ravi Kumar
KBSE
1998
IEEE
15 years 9 months ago
Automated Integrative Analysis of State-based Requirements
Statically analyzing requirements specifications to assure that they possess desirable properties is an important activity in any rigorous software development project. The analys...
Barbara J. Czerny, Mats Per Erik Heimdahl
CP
1997
Springer
15 years 9 months ago
Ordering Constraints over Feature Trees
Feature trees have been used to accommodate records in constraint programming and record like structures in computational linguistics. Feature trees model records, and feature cons...
Martin Müller, Joachim Niehren, Andreas Podel...
173
Voted
ICIP
2007
IEEE
15 years 8 months ago
Real-Time Pedestrian Detection using Eigenflow
We propose a novel learning algorithm to detect moving pedestrians from a stationary camera in real-time. The algorithm learns a discriminative model based on eigenflow, i.e. the ...
Dhiraj Goel, Tsuhan Chen