Sciweavers

5630 search results - page 1111 / 1126
» Computability in Specification
Sort
View
124
Voted
INTERNET
2002
145views more  INTERNET 2002»
15 years 2 months ago
Where is Middleware?
stract level, remote procedure calls enable programmers to invoke (possibly remote) services as if they were intra-application procedure calls. Much like function or procedure call...
Steve Vinoski
153
Voted
CN
1999
128views more  CN 1999»
15 years 2 months ago
Intrusion detection systems as evidence
: Although the main aim of IDSs is to detect intrusions to prompt evasive measures, a further aim can be to supply evidence in criminal and civil legal proceedings. However the fea...
Peter Sommer
159
Voted
JCSC
2002
129views more  JCSC 2002»
15 years 2 months ago
Leakage Current Reduction in VLSI Systems
There is a growing need to analyze and optimize the stand-by component of power in digital circuits designed for portable and battery-powered applications. Since these circuits re...
David Blaauw, Steven M. Martin, Trevor N. Mudge, K...
146
Voted
PAMI
2002
150views more  PAMI 2002»
15 years 2 months ago
Object Tracking with Bayesian Estimation of Dynamic Layer Representations
Decomposing video frames into coherent two-dimensional motion layers is a powerful method for representing videos. Such a representation provides an intermediate description that e...
Hai Tao, Harpreet S. Sawhney, Rakesh Kumar
129
Voted
TIP
2002
131views more  TIP 2002»
15 years 2 months ago
Optimal edge-based shape detection
Abstract--We propose an approach to accurately detecting twodimensional (2-D) shapes. The cross section of the shape boundary is modeled as a step function. We first derive a one-d...
Hankyu Moon, Rama Chellappa, Azriel Rosenfeld
« Prev « First page 1111 / 1126 Last » Next »