Sciweavers

1663 search results - page 252 / 333
» Computer Security in the Real World
Sort
View
140
Voted
ICIP
2006
IEEE
16 years 5 months ago
Multi-View Image Registration for Wide-Baseline Visual Sensor Networks
We present a new dense multi-view registration technique for wide-baseline video/images that integrates a parametric optical flowbased approach with a sparse set of feature corres...
Gulcin Caner, A. Murat Tekalp, Gaurav Sharma, Wend...
ICDE
2008
IEEE
163views Database» more  ICDE 2008»
16 years 5 months ago
Approximate Joins for Data-Centric XML
In data integration applications, a join matches elements that are common to two data sources. Often, however, elements are represented slightly different in each source, so an app...
Nikolaus Augsten, Michael H. Böhlen, Curtis E...
133
Voted
DAC
2005
ACM
16 years 4 months ago
Simulation based deadlock analysis for system level designs
In the design of highly complex, heterogeneous, and concurrent systems, deadlock detection and resolution remains an important issue. In this paper, we systematically analyze the ...
Xi Chen, Abhijit Davare, Harry Hsieh, Alberto L. S...
ICML
2007
IEEE
16 years 4 months ago
Multiclass core vector machine
Even though several techniques have been proposed in the literature for achieving multiclass classification using Support Vector Machine(SVM), the scalability aspect of these appr...
S. Asharaf, M. Narasimha Murty, Shirish Krishnaj S...
KDD
2005
ACM
86views Data Mining» more  KDD 2005»
16 years 4 months ago
Probabilistic workflow mining
In several organizations, it has become increasingly popular to document and log the steps that makeup a typical business process. In some situations, a normative workflow model o...
Ricardo Silva, Jiji Zhang, James G. Shanahan