Sciweavers

13224 search results - page 2489 / 2645
» Self-monitoring for Computer Users
Sort
View
ICSE
2007
IEEE-ACM
14 years 2 months ago
ACL2s: "The ACL2 Sedan"
ACL2 is the latest inception of the Boyer-Moore theorem prover, the 2005 recipient of the ACM Software System Award. In the hands of an expert, it feels like a finely tuned race ...
Peter C. Dillinger, Panagiotis Manolios, Daron Vro...
SIGUCCS
2003
ACM
14 years 1 months ago
WebDAV: what it is, what it does, why you need it
Legacy network file services such as NFS, SMB/CIFS, and AFP changed the way we worked. File services running on crossplatform networks allowed us to save our files on remote syste...
Luis O. Hernández, Mahmoud Pegah
ICDE
2008
IEEE
563views Database» more  ICDE 2008»
15 years 7 months ago
Probabilistic Verifiers: Evaluating Constrained Nearest-Neighbor Queries over Uncertain Data
In applications like location-based services, sensor monitoring and biological databases, the values of the database items are inherently uncertain in nature. An important query fo...
Reynold Cheng, Jinchuan Chen, Mohamed F. Mokbel, C...
CVPR
2009
IEEE
1372views Computer Vision» more  CVPR 2009»
15 years 3 months ago
Blind motion deblurring from a single image using sparse approximation
Restoring a clear image from a single motion-blurred image due to camera shake has long been a challenging problem in digital imaging. Existing blind deblurring techniques eithe...
Jian-Feng Cai (National University of Singapore), ...
CVPR
2007
IEEE
14 years 10 months ago
Bilattice-based Logical Reasoning for Human Detection
The capacity to robustly detect humans in video is a critical component of automated visual surveillance systems. This paper describes a bilattice based logical reasoning approach...
Vinay D. Shet, Jan Neumann, Visvanathan Ramesh, La...
« Prev « First page 2489 / 2645 Last » Next »