Sciweavers

1805 search results - page 270 / 361
» Computationally Efficient Face Detection
Sort
View
144
Voted
CORR
2008
Springer
112views Education» more  CORR 2008»
15 years 3 months ago
SecMon: End-to-End Quality and Security Monitoring System
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and mergi...
Tomasz Ciszkowski, Charlott Eliasson, Markus Fiedl...
138
Voted
TASLP
2008
108views more  TASLP 2008»
15 years 3 months ago
A Regression Approach to Music Emotion Recognition
Content-based retrieval has emerged in the face of content explosion as a promising approach to information access. In this paper, we focus on the challenging issue of recognizing ...
Yi-Hsuan Yang, Yu-Ching Lin, Ya-Fan Su, Homer H. C...
150
Voted
DEDS
2002
119views more  DEDS 2002»
15 years 3 months ago
Diagnosing Discrete-Event Systems: Extending the "Diagnoser Approach" to Deal with Telecommunication Networks
Abstract. Detection and isolation of failures in large and complex systems such as telecommunication networks are crucial and challenging tasks. The problem considered here is that...
Laurence Rozé, Marie-Odile Cordier
129
Voted
CG
2008
Springer
15 years 3 months ago
Parallel reflective symmetry transformation for volume data
Many volume data possess symmetric features that can be clearly observed, for example, those existing in diffusion tensor image data sets. The exploitations of symmetries for volu...
Yuan Hong, Han-Wei Shen
144
Voted
ECBS
1999
IEEE
171views Hardware» more  ECBS 1999»
15 years 8 months ago
Metamodeling - Rapid Design and Evolution of Domain-Specific Modeling Environments
Model integrated computing (MIC) is gaining increased attention as an effective and efficient method for developing, maintaining, and evolving large-scale, domain-specific softwar...
Greg Nordstrom, Janos Sztipanovits, Gabor Karsai, ...