Sciweavers

1210 search results - page 132 / 242
» Specifying Precise Use Cases with Use Case Charts
Sort
View
ICPR
2010
IEEE
15 years 9 months ago
Improved Shadow Removal for Robust Person Tracking in Surveillance Scenarios
Shadow detection and removal is an important step employed after foreground detection, in order to improve the segmentation of objects for tracking. Methods reported in the litera...
Andres Sanin, Conrad Sanderson, Brian Carrington L...
VLDB
2004
ACM
118views Database» more  VLDB 2004»
15 years 9 months ago
Object Fusion in Geographic Information Systems
Given two geographic databases, a fusion algorithm should produce all pairs of corresponding objects (i.e., objects that represent the same real-world entity). Four fusion algorit...
Catriel Beeri, Yaron Kanza, Eliyahu Safra, Yehoshu...
DATE
2010
IEEE
120views Hardware» more  DATE 2010»
15 years 9 months ago
Linear programming approach for performance-driven data aggregation in networks of embedded sensors
Abstract—Cyber Physical Systems are distributed systemsof-systems that integrate sensing, processing, networking and actuation. Aggregating physical data over space and in time e...
Cristian Ferent, Varun Subramanian, Michael Gilber...
ICAIL
2007
ACM
15 years 8 months ago
Deep semantic interpretations of legal texts
One of the main obstacles to progress in the field of artificial intelligence and law is the natural language barrier, but the technology of natural language processing has advanc...
L. Thorne McCarty
ECMDAFA
2007
Springer
84views Hardware» more  ECMDAFA 2007»
15 years 5 months ago
A Practical Approach to Model Extension
In object technology, reusability is achieved primarily through class inheritance. In model engineering, where reusability is also important, it should be possible to extend a mode...
Mikaël Barbero, Frédéric Jouaul...