Sciweavers

297 search results - page 39 / 60
» Choosing a Reliable Hypothesis
Sort
View
ECCV
1998
Springer
14 years 11 months ago
Mobile Robot Localisation Using Active Vision
Active cameras provide a mobile robot with the capability to fixate and track features over a wide field of view. However, their use emphasises serial attention focussing on a succ...
Andrew J. Davison, David W. Murray
ICPR
2004
IEEE
14 years 11 months ago
Face Detection Using Discriminating Feature Analysis and Support Vector Machine in Video
This paper presents a novel face detection method in video by using Discriminating Feature Analysis (DFA) and Support Vector Machine (SVM). Our method first incorporates temporal ...
Chengjun Liu, Peichung Shih
HPCA
2009
IEEE
14 years 10 months ago
Eliminating microarchitectural dependency from Architectural Vulnerability
The Architectural Vulnerability Factor (AVF) of a hardware structure is the probability that a fault in the structure will affect the output of a program. AVF captures both microa...
Vilas Sridharan, David R. Kaeli
ASIAMS
2009
IEEE
14 years 4 months ago
A Case Study of Networks Simulation Tools for Wireless Networks
Networking community is largely depend on simulation to evaluate the behavior and performance of protocols for wireless networks, simulations are a good compromise between cost an...
Saurabh Mehta, Niamat Ullah, Humaun Kabir, Mst. Na...
GLOBECOM
2009
IEEE
14 years 4 months ago
MAC Protocol Engine for Sensor Networks
—We present a novel approach for Medium Access Control (MAC) protocol design based on protocol engine. Current way of designing MAC protocols for a specific application is based...
Sinem Coleri Ergen, Piergiuseppe Di Marco, Carlo F...