Sciweavers

3511 search results - page 516 / 703
» Evaluation Methods for Groupware Systems
Sort
View
LPAR
2004
Springer
14 years 3 months ago
The Dependency Pair Framework: Combining Techniques for Automated Termination Proofs
The dependency pair approach is one of the most powerful techniques for automated termination proofs of term rewrite systems. Up to now, it was regarded as one of several possible ...
Jürgen Giesl, René Thiemann, Peter Sch...
NOSSDAV
2004
Springer
14 years 3 months ago
Managing a portfolio of overlay paths
In recent years, several architectures have been proposed and developed for supporting streaming applications that take advantage of multiple paths through the network simultaneou...
Daria Antonova, Arvind Krishnamurthy, Zheng Ma, Ra...
ACSAC
2003
IEEE
14 years 3 months ago
Behavioral Authentication of Server Flows
Understanding the nature of the information flowing into and out of a system or network is fundamental to determining if there is adherence to a usage policy. Traditional methods...
James P. Early, Carla E. Brodley, Catherine Rosenb...
AMFG
2003
IEEE
148views Biometrics» more  AMFG 2003»
14 years 3 months ago
Multi-Modal Face Tracking Using Bayesian Network
This paper presents a Bayesian network based multimodal fusion method for robust and real-time face tracking. The Bayesian network integrates a prior of second order system dynami...
Fang Liu, Xueyin Lin, Stan Z. Li, Yuanchun Shi
ICDAR
2003
IEEE
14 years 3 months ago
Off-line Character Recognition using On-line Character Writing Information
Recognition of variously deformed character patterns is a salient subject for off-line hand-printed character recognition. Sufficient recognition performance for practical use has...
Hiromitsu Nishimura, Takehiko Timikawa