Sciweavers

1024 search results - page 145 / 205
» Compositional Methods for Probabilistic Systems
Sort
View
CN
2008
85views more  CN 2008»
13 years 8 months ago
Pollution attacks and defenses for Internet caching systems
Proxy caching servers are widely deployed in today's Internet. While cooperation among proxy caches can significantly improve a network's resilience to denial-ofservice ...
Leiwen Deng, Yan Gao, Yan Chen, Aleksandar Kuzmano...
ICASSP
2008
IEEE
14 years 2 months ago
View invariant gesture recognition using 3D motion primitives
This paper presents a method for automatic recognition of human gestures. The method works with 3D image data from a range camera to achieve invariance to viewpoint. The recogniti...
Michael B. Holte, Thomas B. Moeslund
ICDM
2007
IEEE
198views Data Mining» more  ICDM 2007»
14 years 2 months ago
Social Network Extraction of Academic Researchers
This paper addresses the issue of extraction of an academic researcher social network. By researcher social network extraction, we are aimed at finding, extracting, and fusing the...
Jie Tang, Duo Zhang, Limin Yao
NIME
2005
Springer
132views Music» more  NIME 2005»
14 years 1 months ago
"iltur" - Connecting Novices and Experts Through Collaborative Improvisation
The iltur system features a novel method of interaction between expert and novice musicians through a set of musical controllers called Beatbugs. Beatbug players can record live m...
Gil Weinberg, Scott Driscoll
UML
1999
Springer
14 years 1 days ago
Towards a UML Extension for Hypermedia Design
Abstract. The acceptance of UML as a de facto standard for the design of object-oriented systems, together with the explosive growth of the World Wide Web has raised the need for U...
Hubert Baumeister, Nora Koch, Luis Mandel