We introduce a new SIR particle filter that performs tracking in a joint feature space where pixel domain data are fused with measurements obtained from an 18-channel modulation d...
Colin M. Johnston, Nick A. Mould, Joseph P. Havlic...
Many programs need to access data in a relational database. This is usually done by means of queries written in SQL. Although the language SQL is declarative, certain runtime erro...
RAID storage systems protect data from storage errors, such as data corruption, using a set of one or more integrity techniques, such as checksums. The exact protection offered by...
Andrew Krioukov, Lakshmi N. Bairavasundaram, Garth...
Ensuring the correctness of computer systems used in lifecritical applications is very difficult. The most commonly used verification methods, simulation and testing, are not exha...
We describe an application of probabilistic modeling to the problem of recognizing radio galaxies with a bentdouble morphology. The type of galaxies in question contain distinctiv...
Sergey Kirshner, Igor V. Cadez, Padhraic Smyth, Ch...