Sciweavers

769 search results - page 91 / 154
» Identifying objects in legacy systems
Sort
View
CVPR
1997
IEEE
13 years 12 months ago
The FERET Evaluation Methodology for Face-Recognition Algorithms
Two of the most critical requirementsin support of producing reliableface-recognition systems are a large database of facial images and a testing procedure to evaluate systems. Th...
P. Jonathon Phillips, Hyeonjoon Moon, Patrick J. R...
WSCG
2003
145views more  WSCG 2003»
13 years 9 months ago
Analysis of Four-Dimensional Cardiac Data Sets Using Skeleton-Based Segmentation
Computer-aided analysis of four-dimensional tomography data has become an important tool in modern cardiology. In order to examine the capability and health of a patient’s cardi...
André Neubauer, Rainer Wegenkittl
WSC
2000
13 years 9 months ago
Simulation modeling and analysis of a new international terminal
This paper describes a recently completed project involving the development of simulation models for the new international terminal at Istanbul Ataturk Airport, Istanbul, Turkey. ...
Ali S. Kiran, Tekin Cetinkaya, Serafettin Og
KDD
2006
ACM
129views Data Mining» more  KDD 2006»
14 years 8 months ago
Bias and controversy: beyond the statistical deviation
In this paper, we investigate how deviation in evaluation activities may reveal bias on the part of reviewers and controversy on the part of evaluated objects. We focus on a `data...
Hady Wirawan Lauw, Ee-Peng Lim, Ke Wang
PLDI
2009
ACM
14 years 2 months ago
GC assertions: using the garbage collector to check heap properties
This paper introduces GC assertions, a system interface that programmers can use to check for errors, such as data structure invariant violations, and to diagnose performance prob...
Edward Aftandilian, Samuel Z. Guyer