Sciweavers

811 search results - page 151 / 163
» Refactoring Using Type Constraints
Sort
View
HICSS
2002
IEEE
148views Biometrics» more  HICSS 2002»
14 years 1 months ago
Barriers to a Wide-Area Trusted Network Early Warning System for Electric Power Disturbances
It is apparent that perturbations of the North American electric power grid follow the patterns and characteristics of Self Organized Critical (SOC) systems. Published studies sho...
Paul W. Oman, Jeff Roberts
SSIAI
2002
IEEE
14 years 1 months ago
Active Contours for Cell Tracking
This paper introduces an active contour or snakebased method for tracking cells within a video sequence. Specifically, we apply our cell tracking techniques to rolling leukocytes ...
Nilanjan Ray, Scott T. Acton
DESRIST
2009
Springer
109views Education» more  DESRIST 2009»
14 years 1 months ago
The constitutive and the instrumental in social design
Simon’s The Sciences of the Artificial is rightly influential as a founding text in design research in the information systems field (IS). Simon’s contributions in the same vo...
Murali Venkatesh
EUROMICRO
1998
IEEE
14 years 1 months ago
Retransmission Scheme for MPEG Streams in Mission Critical Multimedia Applications
Since multimedia data are characterized by continuity and massive volume, compression techniques such as MPEG are used for efficient transmission. However, a transmission error oc...
Sugh-Hoon Lee, Sungyoung Lee
MM
1993
ACM
107views Multimedia» more  MM 1993»
14 years 1 months ago
What Video Can and Can't Do for Collaboration: A Case Study
As multimedia becomes an integral part of collaborative systems, we must understand how to design such systems to support users’ rich set of existing interaction skills, rather ...
Ellen Isaacs, John C. Tang