Sciweavers

1621 search results - page 49 / 325
» Detecting Experiences from Weblogs
Sort
View
ECBS
2005
IEEE
108views Hardware» more  ECBS 2005»
13 years 11 months ago
Interceptor Based Constraint Violation Detection
Monitoring critical events such as constraints violations is one of the key issues of Autonomic Systems. This paper presents an interceptor based approach of constraint violation ...
Qianxiang Wang, Aditya P. Mathur
CVPR
2012
IEEE
11 years 11 months ago
The scale of edges
Although the scale of isotropic visual elements such as blobs and interest points, e.g. SIFT[12], has been well studied and adopted in various applications, how to determine the s...
Xianming Liu, Changhu Wang, Hongxun Yao, Lei Zhang
AIME
2001
Springer
14 years 1 months ago
Detection of Infectious Outbreaks in Hospitals through Incremental Clustering
Abstract. This paper highlights the shortcomings of current systems of nosocomial infection control and shows how techniques borrowed from statistics and Artificial Intelligence, i...
Timothy Langford, Christophe G. Giraud-Carrier, Jo...
ICIP
2008
IEEE
14 years 3 months ago
Decomposition of branching volume data by tip detection
We present an approach to decomposing branching volume data into sub-branches. First, a metric is proposed for evaluating local convexities in volumetric data, and it is a criteri...
Wei Ma, Bo Xiang, Xiaopeng Zhang, Hongbin Zha
ADHOCNOW
2006
Springer
14 years 3 months ago
Initialization for Ad Hoc Radio Networks with Carrier Sensing and Collision Detection
We consider an ad-hoc network consisting of devices that try to gain access for transmission through a shared communication channel. We redesign randomized protocol of Cai, Lu and ...
Jacek Cichon, Miroslaw Kutylowski, Marcin Zawada