Sciweavers

17471 search results - page 3473 / 3495
» Information Modeling
Sort
View
TIP
1998
142views more  TIP 1998»
13 years 7 months ago
Inversion of large-support ill-posed linear operators using a piecewise Gaussian MRF
Abstract—We propose a method for the reconstruction of signals and images observed partially through a linear operator with a large support (e.g., a Fourier transform on a sparse...
Mila Nikolova, Jérôme Idier, Ali Moha...
TSE
1998
115views more  TSE 1998»
13 years 7 months ago
Integration and Analysis of Use Cases Using Modular Petri Nets in Requirements Engineering
—It is well known that requirements engineering plays a critical role in software quality. The use case approach is a requirements elicitation technique commonly used in industri...
Woo Jin Lee, Sung Deok Cha, Yong Rae Kwon
WINET
2002
144views more  WINET 2002»
13 years 7 months ago
Exposure in Wireless Sensor Networks: Theory and Practical Solutions
Wireless ad-hoc sensor networks have the potential to provide the missing interface between the physical world and the Internet, thus impacting a large number of users. This conne...
Seapahn Megerian, Farinaz Koushanfar, Gang Qu, Gia...
PR
2007
143views more  PR 2007»
13 years 7 months ago
Shadow resistant tracking using inertia constraints
In this paper, we present a new method for tracking objects with shadows. Traditional motion-based tracking schemes cannot usually distinguish the shadow from the object itself, a...
Hao Jiang, Mark S. Drew
PRL
2007
128views more  PRL 2007»
13 years 7 months ago
Automatic recognition of biological particles in microscopic images
A simple and general-purpose system to recognize biological particles is presented. It is composed of four stages. First (if necessary) promising locations in the image are detect...
Marc'Aurelio Ranzato, P. E. Taylor, J. M. House, R...
« Prev « First page 3473 / 3495 Last » Next »