Sciweavers

1053 search results - page 89 / 211
» On k-Path Covers and their applications
Sort
View
ISCAS
2011
IEEE
237views Hardware» more  ISCAS 2011»
13 years 1 months ago
A new network-based algorithm for multi-camera abnormal activity detection
In this paper, a new abnormal activity detection algorithm is proposed for multi-camera surveillance applications. The proposed algorithm models the entire scene covered by the mu...
Hongyu Gao, Weiyao Lin, Xiaokang Yang, Hongxiang L...
CSCW
2012
ACM
12 years 5 months ago
DiscoTech: a plug-in toolkit to improve handling of disconnection and reconnection in real-time groupware
Disconnection and reconnection are common problems for users of synchronous groupware, but these problems are not easy for developers to handle because of the wide range of scenar...
Banani Roy, T. C. Nicholas Graham, Carl Gutwin
MOBICOM
2012
ACM
12 years 16 days ago
Locating in fingerprint space: wireless indoor localization with little human intervention
Indoor localization is of great importance for a range of pervasive applications, attracting many research efforts in the past decades. Most radio-based solutions require a proce...
Zheng Yang, Chenshu Wu, Yunhao Liu
SEMWEB
2009
Springer
14 years 4 months ago
What Four Million Mappings Can Tell You about Two Hundred Ontologies
The field of biomedicine has embraced the Semantic Web probably more than any other field. As a result, there is a large number of biomedical ontologies covering overlapping area...
Amir Ghazvinian, Natalya Fridman Noy, Clement Jonq...
ACSC
2005
IEEE
14 years 3 months ago
A Two-Pronged Attack on the Dragon of Intractability
One approach to tractably finding a solution to an NP-complete optimisation problem is heuristic, where the solution is inexact but quickly found; another approach is to reduce t...
Stephen Gilmour, Mark Dras