Sciweavers

975 search results - page 174 / 195
» Applying Patterns during Business Process Modeling
Sort
View
CCS
2009
ACM
14 years 3 months ago
Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes
Large-scale distributed systems have dense, complex code-bases that are assumed to perform multiple and inter-dependent tasks while user interaction is present. The way users inte...
Angelos Stavrou, Gabriela F. Cretu-Ciocarlie, Mich...
NAS
2010
IEEE
13 years 7 months ago
CR: Capability Information for Routing of Wireless Ad Hoc Networks in the Real Environment
—In greedy routing, each relay node forwards the message to a neighbor (also called successor) that is closer to the destination. However, the successor candidate set (SCS) is di...
Zhen Jiang, Zhigang Li, Nong Xiao, Jie Wu
IJCV
1998
238views more  IJCV 1998»
13 years 8 months ago
Feature Detection with Automatic Scale Selection
The fact that objects in the world appear in different ways depending on the scale of observation has important implications if one aims at describing them. It shows that the not...
Tony Lindeberg
ICDAR
2009
IEEE
14 years 3 months ago
Hierarchical On-line Arabic Handwriting Recognition
In this paper, we present a multi-level recognizer for online Arabic handwriting. In Arabic script (handwritten and printed), cursive writing – is not a style – it is an inher...
Raid Saabni, Jihad El-Sana
ICIP
2009
IEEE
14 years 9 months ago
Display-camera Calibration From Eye Reflections
We present a novel technique for calibrating displaycamera systems from reflections in the user's eyes. Displaycamera systems enable a range of vision applications that need ...