Sciweavers

7682 search results - page 1442 / 1537
» Active Appearance Models
Sort
View
ICSE
2009
IEEE-ACM
15 years 2 months ago
Security Test Generation Using Threat Trees
Software security issues have been a major concern to the cyberspace community, so a great deal of research on security testing has been performed, and various security testing te...
Aaron Marback, Hyunsook Do, Ke He, Samuel Kondamar...
IEEEPACT
2009
IEEE
15 years 2 months ago
ITCA: Inter-task Conflict-Aware CPU Accounting for CMPs
Abstract--Chip-MultiProcessor (CMP) architectures are becoming more and more popular as an alternative to the traditional processors that only extract instruction-level parallelism...
Carlos Luque, Miquel Moretó, Francisco J. C...
IJACTAICIT
2010
122views more  IJACTAICIT 2010»
15 years 1 months ago
Intelligent Integrated Management for Telecommunication Networks
As the size of communication networks keeps on growing, faster connections, cooperating technologies and the divergence of equipment and data communications, the management of the...
Antonio Martín, Carlos León, F&eacut...
ICMCS
2007
IEEE
162views Multimedia» more  ICMCS 2007»
15 years 8 months ago
User-Assisted People Search in Consumer Image Collections
In this paper, we investigate the process of searching for images of specified people in the consumer family photo domain. This domain is very different from the controlled enviro...
Andrew C. Gallagher, Madirakshi Das, Alexander C. ...
CVPR
2011
IEEE
15 years 27 days ago
Interactively Building a Discriminative Vocabulary of Nameable Attributes
Human-nameable visual attributes offer many advantages when used as mid-level features for object recognition, but existing techniques to gather relevant attributes can be ineffici...
Devi Parikh, Kristen Grauman
« Prev « First page 1442 / 1537 Last » Next »