Sciweavers

257 search results - page 42 / 52
» Automatic red-eye detection and correction
Sort
View
SIGCOMM
2012
ACM
11 years 10 months ago
Reduction-based analysis of BGP systems with BGPVerif
Today’s inter-domain routing protocol, the Border Gateway Protocol (BGP), is increasingly complicated and fragile due to policy misconfiguration by individual autonomous system...
Anduo Wang, Alexander J. T. Gurney, Xianglong Han,...
ISBI
2008
IEEE
14 years 8 months ago
Chromosome pairing for karyotyping purposes using mutual information
Cytogenetics is the preferred tool in the diagnosis of genetic diseases such as leukemia and detection of aquired chromosomal abnormalities, such as translocations, deletions, mon...
Artem Khmelinskii, João Sanches, Rodrigo Ve...
CAV
1998
Springer
175views Hardware» more  CAV 1998»
13 years 11 months ago
An ACL2 Proof of Write Invalidate Cache Coherence
As a pedagogical exercise in ACL2, we formalize and prove the correctness of a write invalidate cache scheme. In our formalization, an arbitrary number of processors, each with its...
J. Strother Moore
ICDE
2006
IEEE
193views Database» more  ICDE 2006»
14 years 9 months ago
Probabilistic Message Passing in Peer Data Management Systems
Until recently, most data integration techniques involved central components, e.g., global schemas, to enable transparent access to heterogeneous databases. Today, however, with t...
Philippe Cudré-Mauroux, Karl Aberer, Andras...
ECCV
2006
Springer
14 years 9 months ago
Robust Visual Tracking for Multiple Targets
We address the problem of robust multi-target tracking within the application of hockey player tracking. The particle filter technique is adopted and modified to fit into the multi...
Yizheng Cai, Nando de Freitas, James J. Little