Sciweavers

322 search results - page 35 / 65
» Recovering execution data from incomplete observations
Sort
View
CORR
2008
Springer
113views Education» more  CORR 2008»
13 years 10 months ago
A Functional Hitchhiker's Guide to Hereditarily Finite Sets, Ackermann Encodings and Pairing Functions
The paper is organized as a self-contained literate Haskell program that implements elements of an executable finite set theory with focus on combinatorial generation and arithmet...
Paul Tarau
BWCCA
2010
13 years 4 months ago
Fast Deployment of Computer Forensics with USBs
As popularity of the Internet continues to grow, it changes the way of computer crime. Number of computer crime increases dramatically in recent years and investigators have been f...
Chung-Huang Yang, Pei-Hua Yen
ICCV
2007
IEEE
14 years 11 months ago
Learning Higher-order Transition Models in Medium-scale Camera Networks
We present a Bayesian framework for learning higherorder transition models in video surveillance networks. Such higher-order models describe object movement between cameras in the...
Ryan Farrell, David S. Doermann, Larry S. Davis
ICCV
2011
IEEE
12 years 10 months ago
Latent Low-Rank Representation for Subspace Segmentation and Feature Extraction
Low-Rank Representation (LRR) [16, 17] is an effective method for exploring the multiple subspace structures of data. Usually, the observed data matrix itself is chosen as the dic...
Guangcan Liu, Shuicheng Yan
IJWET
2007
99views more  IJWET 2007»
13 years 9 months ago
An empirical approach to evaluating web application compliance across diverse client platform configurations
: Web applications are the most widely used class of software today. Increased diversity of web-client platform configurations causes execution of web applications to vary unpredic...
Cyntrica Eaton, Atif M. Memon