Sciweavers

3318 search results - page 100 / 664
» The Weak Instance Model
Sort
View
ICIP
2006
IEEE
14 years 9 months ago
3D Target Scale Estimation for Size Preserving in PTZ Video Tracking
In size preserving video tracking, the camera's focal length (zoom) is adjusted automatically to compensate for the changes in the target's image size caused by the rela...
Yi Yao, Besma R. Abidi, Mongi A. Abidi
CCGRID
2009
IEEE
14 years 2 months ago
Performance under Failures of DAG-based Parallel Computing
— As the scale and complexity of parallel systems continue to grow, failures become more and more an inevitable fact for solving large-scale applications. In this research, we pr...
Hui Jin, Xian-He Sun, Ziming Zheng, Zhiling Lan, B...
GI
2004
Springer
14 years 1 months ago
Extending BPEL4WS for Multiple Instantiation
: A means to define multiple activity instantiation is an important feature of a business process modelling language. In this paper we suggest to extend BPEL4WS with structured ac...
Jan Mendling, Mark Strembeck, Gustaf Neumann
CORR
2010
Springer
109views Education» more  CORR 2010»
13 years 8 months ago
Optimal Direct Sum Results for Deterministic and Randomized Decision Tree Complexity
A Direct Sum Theorem holds in a model of computation, when for every problem solving some k input instances together is k times as expensive as solving one. We show that Direct Su...
Rahul Jain, Hartmut Klauck, Miklos Santha
FMICS
2010
Springer
13 years 9 months ago
A Formal Model of Identity Mixer
Identity Mixer is an anonymous credential system developed at IBM that allows users for instance to prove that they are over 18 years old without revealing their name or birthdate....
Jan Camenisch, Sebastian Mödersheim, Dieter S...