Sciweavers

1795 search results - page 205 / 359
» Security Models and Information Flow
Sort
View
BC
2004
97views more  BC 2004»
15 years 4 months ago
An elaborated model of fly small-target tracking
Flies have the capability to visually track small moving targets, even across cluttered backgrounds. Previous computational models, based on figure detection (FD) cells identified ...
Charles M. Higgins, Vivek Pant
ICCV
2001
IEEE
16 years 6 months ago
A Background Model Initialization Algorithm for Video Surveillance
Many motion detection and tracking algorithms rely on the process of background subtraction, a technique which detects changes from a model of the background scene. We present a n...
Daniel Gutchess, Miroslav Trajkovic, Eric Cohen-So...
FORTE
2004
15 years 5 months ago
PEPA Nets in Practice: Modelling a Decentralised Peer-to-Peer Emergency Medical Application
Abstract. We apply the PEPA nets modelling language to modelling a peer-topeer medical informatics application, the FieldCare PDA-based medical records system developed by SINTEF T...
Stephen Gilmore, Valentin Haenel, Jane Hillston, L...
ACMICEC
2003
ACM
104views ECommerce» more  ACMICEC 2003»
15 years 9 months ago
Document exchange model for augmenting added value of B2B collaboration
In this paper we present a B2B integration project, which aims to augment the added value of services instead of improving efficiency by automating processes. This paper introduce...
Koichi Hayashi, Riichiro Mizoguchi
CORR
2010
Springer
197views Education» more  CORR 2010»
15 years 4 months ago
Modelling of Human Glottis in VLSI for Low Power Architectures
The Glottal Source is an important component of voice as it can be considered as the excitation signal to the voice apparatus. Nowadays, new techniques of speech processing such a...
Nikhil Raj, R. K. Sharma