Sciweavers

182 search results - page 30 / 37
» Activity recognition using temporal evidence theory
Sort
View
SCP
1998
163views more  SCP 1998»
13 years 9 months ago
Computing with Continuous Change
A central challenge in computer science and knowledge representation is the integration of conceptual frameworks for continuous and discrete change, as exemplified by the theory ...
Vineet Gupta, Radha Jagadeesan, Vijay A. Saraswat
DESRIST
2009
Springer
137views Education» more  DESRIST 2009»
14 years 2 months ago
Coordination analysis: a method for deriving use cases from process dependencies
Despite the widespread recognition that information technology (IT) and business process are tightly connected, existing system design methods provide limited guidance on how to t...
Xiang Michelle Liu, George M. Wyner
IAAI
1993
13 years 11 months ago
Dodger, a Diagnostic Expert System for the Evaluation of Nondestructive Test Data
Identification and characterization of indications in eddy current (ET) signals can be highly subjective in nature, with varying diagnoses made by different analysts or by a singl...
Arthur J. Levy, Jane E. Oppenlander, David M. Brud...
CVPR
2008
IEEE
14 years 11 months ago
Statistical analysis on Stiefel and Grassmann manifolds with applications in computer vision
Many applications in computer vision and pattern recognition involve drawing inferences on certain manifoldvalued parameters. In order to develop accurate inference algorithms on ...
Pavan K. Turaga, Ashok Veeraraghavan, Rama Chellap...
CAV
2011
Springer
216views Hardware» more  CAV 2011»
13 years 1 months ago
Malware Analysis with Tree Automata Inference
Abstract. The underground malware-based economy is flourishing and it is evident that the classical ad-hoc signature detection methods are becoming insufficient. Malware authors ...
Domagoj Babic, Daniel Reynaud, Dawn Song