Sciweavers

861 search results - page 127 / 173
» Predicting Attack-prone Components
Sort
View
CVPR
2003
IEEE
14 years 29 days ago
Continuous Tracking Within and Across Camera Streams
This paper presents a new approach for continuous tracking of moving objects observed by multiple, heterogeneous cameras. Our approach simultaneously processes video streams from ...
Jinman Kang, Isaac Cohen, Gérard G. Medioni
DATE
2003
IEEE
109views Hardware» more  DATE 2003»
14 years 29 days ago
Run-Time Management of Logic Resources on Reconfigurable Systems
Dynamically reconfigurable systems based on partial and dynamically reconfigurable FPGAs may have their functionality partially modified at run-time without stopping the operation...
Manuel G. Gericota, Gustavo R. Alves, Miguel L. Si...
DSN
2003
IEEE
14 years 29 days ago
Human-Machine Diversity in the Use of Computerised Advisory Systems: A Case Study
Computer-based advisory systems form with their users composite, human-machine systems. Redundancy and diversity between the human and the machine are often important for the depe...
Lorenzo Strigini, Andrey Povyakalo, Eugenio Alberd...
HPDC
2003
IEEE
14 years 28 days ago
Resource-Aware Stream Management with the Customizable dproc Distributed Monitoring Mechanisms
Monitoring the resources of distributed systems is essential to the successful deployment and execution of grid applications, particularly when such applications have welldefined...
Sandip Agarwala, Christian Poellabauer, Jiantao Ko...
ICDAR
2003
IEEE
14 years 28 days ago
Word Segmentation of Handwritten Dates in Historical Documents by Combining Semantic A-Priori-Knowledge with Local Features
The recognition of script in historical documents requires suitable techniques in order to identify single words. Segmentation of lines and words is a challenging task because lin...
Markus Feldbach, Klaus D. Tönnies