Sciweavers

17789 search results - page 3450 / 3558
» Exceptional Use Cases
Sort
View
CIVR
2007
Springer
254views Image Analysis» more  CIVR 2007»
14 years 2 months ago
Soccer players identification based on visual local features
Semantic detection and recognition of objects and events contained in a video stream has to be performed in order to provide content-based annotation and retrieval of videos. This...
Lamberto Ballan, Marco Bertini, Alberto Del Bimbo,...
DEXA
2007
Springer
107views Database» more  DEXA 2007»
14 years 2 months ago
When Mobile Objects' Energy Is Not So Tight: A New Perspective on Scalability Issues of Continuous Spatial Query Systems
The two dominant costs in continuous spatial query systems are the wireless communication cost for location update, and the evaluation cost for query processing. Existing works add...
Tai T. Do, Fuyu Liu, Kien A. Hua
COCO
2010
Springer
153views Algorithms» more  COCO 2010»
14 years 2 months ago
Communication Complexity with Synchronized Clocks
Abstract—We consider two natural extensions of the communication complexity model that are inspired by distributed computing. In both models, two parties are equipped with synchr...
Russell Impagliazzo, Ryan Williams
DAC
2010
ACM
14 years 2 months ago
TSV stress aware timing analysis with applications to 3D-IC layout optimization
As the geometry shrinking faces severe limitations, 3D wafer stacking with through silicon via (TSV) has gained interest for future SOC integration. Since TSV fill material and s...
Jae-Seok Yang, Krit Athikulwongse, Young-Joon Lee,...
SP
2010
IEEE
194views Security Privacy» more  SP 2010»
14 years 2 months ago
Identifying Dormant Functionality in Malware Programs
—To handle the growing flood of malware, security vendors and analysts rely on tools that automatically identify and analyze malicious code. Current systems for automated malwar...
Paolo Milani Comparetti, Guido Salvaneschi, Engin ...
« Prev « First page 3450 / 3558 Last » Next »