Sciweavers

110 search results - page 15 / 22
» A Method for Estimating Authentication Performance over Time...
Sort
View
DCOSS
2007
Springer
14 years 1 months ago
Separating the Wheat from the Chaff: Practical Anomaly Detection Schemes in Ecological Applications of Distributed Sensor Networ
Abstract. We develop a practical, distributed algorithm to detect events, identify measurement errors, and infer missing readings in ecological applications of wireless sensor netw...
Luís M. A. Bettencourt, Aric A. Hagberg, Le...
TIP
2002
126views more  TIP 2002»
13 years 7 months ago
A generic approach to simultaneous tracking and verification in video
In this paper, a generic approach to simultaneous tracking and verification in video data is presented. The approach is based on posterior density estimation using sequential Monte...
Baoxin Li, Rama Chellappa
CVIU
2011
12 years 11 months ago
Markerless reconstruction and synthesis of dynamic facial expressions
In this paper we combine methods from the field of computer vision with surface editing techniques to generate animated faces, which are all in full correspondence to each other....
Dominik Sibbing, Martin Habbecke, Leif Kobbelt
DATE
2004
IEEE
114views Hardware» more  DATE 2004»
13 years 11 months ago
Workload Characterization Model for Tasks with Variable Execution Demand
The analysis of real-time properties of an embedded system usually relies on the worst-case execution times (WCET) of the tasks to be executed. In contrast to that, in real world ...
Alexander Maxiaguine, Simon Künzli, Lothar Th...
BMCBI
2011
12 years 11 months ago
Efficient alignment of pyrosequencing reads for re-sequencing applications
Background: Over the past few years, new massively parallel DNA sequencing technologies have emerged. These platforms generate massive amounts of data per run, greatly reducing th...
Francisco Fernandes, Paulo G. S. da Fonseca, Lu&ia...