Sciweavers

1539 search results - page 269 / 308
» Active Correlation Tracking
Sort
View
ICSE
2010
IEEE-ACM
13 years 8 months ago
Fourth International Workshop on Software Clones (IWSC)
Software clones are identical or similar pieces of code. They are often the result of copy–and–paste activities as ad-hoc code reuse by programmers. Software clones research i...
Katsuro Inoue, Stanislaw Jarzabek, James R. Cordy,...
IJCAT
2010
273views more  IJCAT 2010»
13 years 8 months ago
FPGA implementation of log-polar mapping
Log-polar or spatially-variant image representation is an important component of active vision system in tracking process for many robotic applications due to its data compression ...
Wai Kit Wong, Chee Wee Choo, Chu Kiong Loo, Joo Pe...
JOCN
2010
95views more  JOCN 2010»
13 years 8 months ago
Visual Short-term Memory Capacity for Simple and Complex Objects
■ Does the capacity of visual short-term memory (VSTM) depend on the complexity of the objects represented in memory? Although some previous findings indicated lower capacity fo...
Roy Luria, Paola Sessa, Alex Gotler, Pierre Jolico...
JSAC
2010
147views more  JSAC 2010»
13 years 8 months ago
Joint identity-message coding
In a significant class of sensor-network applications, the identities of the reporting sensors constitute the bulk of the communicated data, whereas the message itself can be as ...
Lorenzo Keller, Mahdi Jafari Siavoshani, Christina...
JUCS
2010
162views more  JUCS 2010»
13 years 8 months ago
Enabling Personal Privacy for Pervasive Computing Environments
: Protection of personal data in the Internet is already a challenge today. Users have to actively look up privacy policies of websites and decide whether they can live with the te...
Susana Alcalde Bagüés, Andreas Zeidler...