Sciweavers

6812 search results - page 1350 / 1363
» Detection of Information Flows
Sort
View
TMM
2008
167views more  TMM 2008»
13 years 7 months ago
Mining Appearance Models Directly From Compressed Video
In this paper, we propose an approach to learning appearance models of moving objects directly from compressed video. The appearance of a moving object changes dynamically in vide...
Datong Chen, Qiang Liu, Mingui Sun, Jie Yang
TNN
2008
124views more  TNN 2008»
13 years 7 months ago
Just-in-Time Adaptive Classifiers - Part II: Designing the Classifier
Aging effects, environmental changes, thermal drifts, and soft and hard faults affect physical systems by changing their nature and behavior over time. To cope with a process evolu...
Cesare Alippi, Manuel Roveri
JCP
2007
108views more  JCP 2007»
13 years 7 months ago
A Genetic Algorithm Method to Assimilate Sensor Data for a Toxic Contaminant Release
— Following a toxic contaminant release, either accidental or intentional, predicting the transport and dispersion of the contaminant becomes a critical problem for Homeland Defe...
Sue Ellen Haupt, George S. Young, Christopher T. A...
CAD
2005
Springer
13 years 7 months ago
Frontal geometry from sketches of engineering objects: is line labelling necessary?
A tool which can quickly interpret line drawings (with hidden lines removed) of engineering objects as boundary representation CAD models would be of significant benefit in the pr...
P. A. C. Varley, Ralph R. Martin, Hiromasa Suzuki
TWC
2008
120views more  TWC 2008»
13 years 7 months ago
A cartel maintenance framework to enforce cooperation in wireless networks with selfish users
Abstract-- In distributed wireless networks without centralized control, each user is its own authority to maximize its own performance. This distributed characteristic provides th...
Zhu Han, Zhu Ji, K. J. Ray Liu
« Prev « First page 1350 / 1363 Last » Next »