Sciweavers

1575 search results - page 40 / 315
» A Behavioral Analysis of Computational Models of Visual Atte...
Sort
View
BMCBI
2011
12 years 11 months ago
Acorn: A grid computing system for constraint based modeling and visualization of the genome scale metabolic reaction networks v
Background: Constraint-based approaches facilitate the prediction of cellular metabolic capabilities, based, in turn on predictions of the repertoire of enzymes encoded in the gen...
Jacek Sroka, Lukasz Bieniasz-Krzywiec, Szymon Gwoz...
IWSEC
2010
Springer
13 years 6 months ago
Optimal Adversary Behavior for the Serial Model of Financial Attack Trees
Abstract. Attack tree analysis is used to estimate different parameters of general security threats based on information available for atomic subthreats. We focus on estimating the...
Margus Niitsoo
BVAI
2007
Springer
13 years 11 months ago
Different Binding Strategies for the Different Stages of Visual Recognition
Many think attention needs an executive to allocate resources. Although the cortex exhibits substantial plasticity, dynamic allocation of neurons seems outside its capability. Supp...
John K. Tsotsos, Antonio Jose Rodríguez-S&a...
IPPS
2002
IEEE
14 years 15 days ago
Failure Behavior Analysis for Reliable Distributed Embedded Systems
Failure behavior analysis is a very important phase in developing large distributed embedded systems with weak safety requirements which do graceful degradation in case of failure...
Mario Trapp, Bernd Schürmann, Torsten Tettero...
CLEAR
2007
Springer
180views Biometrics» more  CLEAR 2007»
14 years 1 months ago
Joint Bayesian Tracking of Head Location and Pose from Low-Resolution Video
Abstract. This paper presents a visual particle filter for jointly tracking the position of a person and her head pose. The resulting information may be used to support automatic ...
Oswald Lanz, Roberto Brunelli