Sciweavers

4050 search results - page 707 / 810
» Information Extraction from Voicemail
Sort
View
CVPR
2010
IEEE
14 years 1 months ago
Person Re-Identification by Symmetry-Driven Accumulation of Local Features
In this paper, we present an appearance-based method for person re-identification. It consists in the extraction of features that model three complementary aspects of the human ap...
Michela Farenzena, Loris Bazzani, Alessandro Perin...
POPL
1999
ACM
14 years 1 months ago
Software Watermarking: Models and Dynamic Embeddings
Watermarking embeds a secret message into a cover message. In media watermarking the secret is usually a copyright notice and the cover a digital image. Watermarking an object dis...
Christian S. Collberg, Clark D. Thomborson
GIS
1999
ACM
14 years 1 months ago
Specifying Analysis Patterns for Geographic Databases on the Basis of a Conceptual Framework
Frameworks and Patterns are important instruments that enable the reuse of successful software solutions in recurrent problems. Geographic information systems, on the other hand, ...
Jugurta Lisboa Filho, Cirano Iochpe
ASYNC
1998
IEEE
110views Hardware» more  ASYNC 1998»
14 years 1 months ago
Analyzing Specifications for Delay-Insensitive Circuits
We present the XDI Model for specifying delay-insensitive circuits, that is, reactive systems that correctly exchange signals with their environment in spite of unknown delays inc...
Tom Verhoeff
SAS
1999
Springer
116views Formal Methods» more  SAS 1999»
14 years 1 months ago
Decomposing Non-redundant Sharing by Complementation
Complementation, the inverse of the reduced product operation, is a technique for systemfinding minimal decompositions of abstract domains. Fil´e and Ranzato advanced the state ...
Enea Zaffanella, Patricia M. Hill, Roberto Bagnara