Sciweavers

2604 search results - page 414 / 521
» Human Errors and System Requirements
Sort
View
DSN
2006
IEEE
14 years 3 months ago
Designing dependable storage solutions for shared application environments
The costs of data loss and unavailability can be large, so businesses use many data protection techniques, such as remote mirroring, snapshots and backups, to guard against failur...
Shravan Gaonkar, Kimberly Keeton, Arif Merchant, W...
ICMCS
2006
IEEE
210views Multimedia» more  ICMCS 2006»
14 years 3 months ago
3D-TV Content Generation: 2D-to-3D Conversion
The next major advancement in television is expected to be stereoscopic three-dimensional television (3D-TV). A successful roll-out of 3D-TV will require a backwardcompatible tran...
Wa James Tam, Liang Zhang
MMSEC
2006
ACM
213views Multimedia» more  MMSEC 2006»
14 years 2 months ago
Parameter optimization for biometric fingerprint recognition using genetic algorithms
In this paper, we suggest an optimization approach for fingerprint authentication using genetic algorithms. Our application was planned so that it can be used without great effort...
Tobias Scheidat, Andreas Engel, Claus Vielhauer
HAPTICS
2005
IEEE
14 years 2 months ago
Force Feedback Interface for Cell Injection
Manual pronuclei injection and intracytoplasmic sperm injection (ICSI) requires long training and has low success rates primarily due to poor control over the injection force. Con...
Anand Pillarisetti, Waqas Anjum, Jaydev P. Desai, ...
WACV
2005
IEEE
14 years 2 months ago
Automatic 2D Hand Tracking in Video Sequences
In gesture and sign language video sequences, hand motion tends to be rapid, and hands frequently appear in front of each other or in front of the face. Thus, hand location is oft...
Quan Yuan, Stan Sclaroff, Vassilis Athitsos