Sciweavers

1974 search results - page 316 / 395
» Conditional Purchase Orders
Sort
View
EXPERT
2010
145views more  EXPERT 2010»
13 years 5 months ago
Interaction Analysis with a Bayesian Trajectory Model
Human behavior recognition is one of the most important and challenging objectives performed by intelligent vision systems. Several issues must be faced in this domain ranging fro...
Alessio Dore, Carlo S. Regazzoni
IJACTAICIT
2010
146views more  IJACTAICIT 2010»
13 years 5 months ago
Modeling and Simulation of a Pervasive Multimodal Multimedia Computing System for Visually-Impaired Users
Using multimodality in a computing system is advantageous in the sense that it makes computing more accessible to a wide range of users including those with impairments. Our work ...
Ali Awde, Moeiz Miraoui, Chakib Tadj, Yacine Belli...
COMPSAC
2010
IEEE
13 years 4 months ago
Security in Context: Analysis and Refinement of Software Architectures
Security analysis methods can provide correct yet meaningless results if the assumptions underlying the model do not conform to reality. We present an approach to analyze the secur...
Thomas Heyman, Riccardo Scandariato, Wouter Joosen
CORR
2010
Springer
98views Education» more  CORR 2010»
13 years 4 months ago
Satisfaction Equilibrium: A General Framework for QoS Provisioning in Self-Configuring Networks
Abstract--This paper is concerned with the concept of equilibrium and quality of service (QoS) provisioning in self-configuring wireless networks with non-cooperative radio devices...
Samir Medina Perlaza, Hamidou Tembine, Samson Lasa...
CVPR
2011
IEEE
13 years 4 months ago
Learning Effective Human Pose Estimation from Inaccurate Annotation
The task of 2-D articulated human pose estimation in natural images is extremely challenging due to the high level of variation in human appearance. These variations arise from di...
Sam Johnson, Mark Everingham