Sciweavers

3281 search results - page 534 / 657
» An Approach to use Executable Models for Testing
Sort
View
ICMLA
2009
14 years 6 months ago
Statistical Decision Making for Authentication and Intrusion Detection
User authentication and intrusion detection differ from standard classification problems in that while we have data generated from legitimate users, impostor or intrusion data is s...
Christos Dimitrakakis, Aikaterini Mitrokotsa
ICCAD
2006
IEEE
113views Hardware» more  ICCAD 2006»
14 years 6 months ago
Layer minimization of escape routing in area array packaging
We devise a central triangular sequence to minimize the escape routing layers in area array packaging. We use a network flow model to analyze the bottleneck of the routable pins. ...
Renshen Wang, Rui Shi, Chung-Kuan Cheng
ICASSP
2008
IEEE
14 years 3 months ago
Multi-feature vector flow for active contour tracking
In order to achieve both fast tracking and accurate object extraction, we present in this paper an original real-time active contour method, incorporating different feature maps i...
Joanna I. Olszewska, Christophe De Vleeschouwer, B...
FGR
2006
IEEE
297views Biometrics» more  FGR 2006»
14 years 3 months ago
Automatic Skin Segmentation for Gesture Recognition Combining Region and Support Vector Machine Active Learning
Skin segmentation is the cornerstone of many applications such as gesture recognition, face detection, and objectionable image filtering. In this paper, we attempt to address the ...
Junwei Han, George Awad, Alistair Sutherland, Hai ...
CSCW
2006
ACM
14 years 3 months ago
Sandboxes: supporting social play through collaborative multimedia composition on mobile phones
Media sharing over mobile devices is quickly becoming a common practice, used to support a variety of social processes. Most existing systems employ a model of sharing that treats...
David Fono, Scott Counts