Sciweavers

759 search results - page 128 / 152
» Identifying Modeling Errors in Signatures by Model Checking
Sort
View
ICDCS
2010
IEEE
13 years 11 months ago
Sentomist: Unveiling Transient Sensor Network Bugs via Symptom Mining
—Wireless Sensor Network (WSN) applications are typically event-driven. While the source codes of these applications may look simple, they are executed with a complicated concurr...
Yangfan Zhou, Xinyu Chen, Michael R. Lyu, Jiangchu...
ICPR
2002
IEEE
14 years 8 months ago
Person Identification Using Automatic Height and Stride Estimation
We present a parametric method to automatically identify people in monocular low-resolution video by estimating the height and stride parameters of their gait. Stride parameters (...
Chiraz BenAbdelkader, Ross Cutler, Larry S. Davis
ICML
2007
IEEE
14 years 8 months ago
Nonlinear independent component analysis with minimal nonlinear distortion
Nonlinear ICA may not result in nonlinear blind source separation, since solutions to nonlinear ICA are highly non-unique. In practice, the nonlinearity in the data generation pro...
Kun Zhang, Laiwan Chan
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
13 years 11 months ago
Specifying and Analyzing Workflows for Automated Identification and Data Capture
Humans use computers to carry out tasks that neither is able to do easily alone: humans provide eyes, hands, and judgment while computers provide computation, networking, and stor...
Elsa L. Gunter, Ayesha Yasmeen, Carl A. Gunter, An...
ATAL
2008
Springer
13 years 9 months ago
The identification of users by relational agents
Virtual agents designed to establish relationships with more than one user must be able to identify and distinguish among those users with high reliability. We descr...
Daniel Schulman, Mayur Sharma, Timothy W. Bickmore