Sciweavers

1227 search results - page 220 / 246
» Using Generation for Grammar Analysis and Error Detection
Sort
View
CVPR
2005
IEEE
15 years 11 months ago
Statistical Cue Integration for Foveated Wide-Field Surveillance
Reliable detection of human activity is an unsolved problem. The main is that low resolution and the unconstrained nature of realistic environments and human behaviourmakeform cue...
Simon J. D. Prince, James H. Elder, Yuqian Hou, Mi...
AMC
2007
134views more  AMC 2007»
14 years 10 months ago
An image fragile watermark scheme based on chaotic image pattern and pixel-pairs
Fragile watermarking techniques for digital content have been studied in the past few years. Fragile watermarks are used to determine if a piece of watermarked digital content has...
Shaohui Liu, Hongxun Yao, Wen Gao, Yongliang Liu
CG
2008
Springer
14 years 9 months ago
Practical global illumination for interactive particle visualization
Particle-based simulation methods are used to model a wide range of complex phenomena and to solve time-dependent problems of various scales. Effective visualizations of the resul...
Christiaan P. Gribble, Carson Brownlee, Steven G. ...
IPM
2008
139views more  IPM 2008»
14 years 9 months ago
Users can change their web search tactics: Design guidelines for categorized overviews
Categorized overviews of web search results are a promising way to support user exploration, understanding, and discovery. These search interfaces combine a metadata-based overvie...
Bill Kules, Ben Shneiderman
INFOCOM
2011
IEEE
14 years 1 months ago
Maintaining source privacy under eavesdropping and node compromise attacks
—In a sensor network, an important problem is to provide privacy to the event detecting sensor node and integrity to the data gathered by the node. Compromised source privacy can...
Kanthakumar Pongaliur, Li Xiao