Sciweavers

993 search results - page 143 / 199
» Classification Reliability and Its Use in Multi-classifier S...
Sort
View
TCSV
2008
150views more  TCSV 2008»
13 years 7 months ago
Robust Video Fingerprinting for Content-Based Video Identification
Video fingerprints are feature vectors that uniquely characterize one video clip from another. The goal of video fingerprinting is to identify a given video query in a database (DB...
Sunil Lee, Chang Dong Yoo
OZCHI
2006
ACM
14 years 1 months ago
LookPoint: an evaluation of eye input for hands-free switching of input devices between multiple computers
We present LookPoint, a system that uses eye input for switching input between multiple computing devices. LookPoint uses an eye tracker to detect which screen the user is looking...
Connor Dickie, Jamie Hart, Roel Vertegaal, Alex Ei...
ICPR
2004
IEEE
14 years 8 months ago
Vision Based Fire Detection
Vision based fire detection is potentially a useful technique. With the increase in the number of surveillance cameras being installed, a vision based fire detection capability ca...
Che-Bin Liu, Narendra Ahuja
SASO
2009
IEEE
14 years 2 months ago
Self-organized Fault-tolerant Routing in Peer-to-Peer Overlays
—In sufficiently large heterogeneous overlays message loss and delays are likely to occur. This has a significant impact on overlay routing, especially on longer paths. The exi...
Wojciech Galuba, Karl Aberer, Zoran Despotovic, Wo...
PODC
2006
ACM
14 years 1 months ago
Self-stabilizing byzantine agreement
Byzantine agreement algorithms typically assume implicit initial state consistency and synchronization among the correct nodes and then operate in coordinated rounds of informatio...
Ariel Daliot, Danny Dolev