Sciweavers

1687 search results - page 210 / 338
» Which pointer analysis should I use
Sort
View
RAM
2008
IEEE
163views Robotics» more  RAM 2008»
15 years 11 months ago
Reactive Gaze Control for Natural Human-Robot Interactions
Abstract—Nonverbal behavior during human-human close encounters is critical to the accomplishment of natural interaction. For this reason, humanoid robots trying to achieve natur...
Yasser F. O. Mohammad, Toyoaki Nishida
ICMCS
2006
IEEE
215views Multimedia» more  ICMCS 2006»
15 years 10 months ago
Experiential Sampling based Foreground/Background Segmentation for Video Surveillance
Segmentation of foreground and background has been an important research problem arising out of many applications including video surveillance. A method commonly used for segmenta...
Pradeep K. Atrey, Vinay Kumar, Anurag Kumar, Mohan...
LCN
2003
IEEE
15 years 10 months ago
Regional Gossip Routing for Wireless Ad Hoc Networks
Abstract—Many routing protocols have been proposed for wireless ad hoc networks, and most of them are based on some variants of flooding. Thus many routing messages are propagat...
Xiang-Yang Li, Kousha Moaveninejad, Ophir Frieder
PODS
1997
ACM
72views Database» more  PODS 1997»
15 years 8 months ago
OLAP and Statistical Databases: Similarities and Differences
During the 1980's there was a lot of activity in the area of Statistical Databases, focusing mostly on socio-economic type applications, such as census data, national product...
Arie Shoshani
KDD
2010
ACM
214views Data Mining» more  KDD 2010»
15 years 8 months ago
Neighbor query friendly compression of social networks
Compressing social networks can substantially facilitate mining and advanced analysis of large social networks. Preferably, social networks should be compressed in a way that they...
Hossein Maserrat, Jian Pei