Sciweavers

1501 search results - page 165 / 301
» Towards Integration of Modeling Methods for Cyber-Physical S...
Sort
View
ISVLSI
2005
IEEE
101views VLSI» more  ISVLSI 2005»
15 years 10 months ago
eWatch: Context Sensitive System Design Case Study
In this paper, we introduce a novel context sensitive system design paradigm. Multiple sensors/ computational architecture, in the form of our eWatch device, is used to infer the ...
Asim Smailagic, Daniel P. Siewiorek, Uwe Maurer, A...
SPW
2000
Springer
15 years 8 months ago
Users and Trust in Cyberspace
The underlying belief and knowledge models assumed by various kinds of authentication protocols have been studied for well over 10 years now. On the other hand, the related questio...
Pekka Nikander, Kristiina Karvonen
MMS
2008
15 years 4 months ago
The canonical expression of the drama product manufacturing processes
As the broadcast industry is evolving toward IT-based facilities, the production workflows and their associated production metadata should similarly take advantage of IT commoditi...
Dieter Van Rijsselbergen, Barbara Van De Keer, Rik...
145
Voted
NIPS
2000
15 years 5 months ago
Discovering Hidden Variables: A Structure-Based Approach
A serious problem in learning probabilistic models is the presence of hidden variables. These variables are not observed, yet interact with several of the observed variables. As s...
Gal Elidan, Noam Lotner, Nir Friedman, Daphne Koll...
ECCV
2010
Springer
15 years 9 months ago
What, Where & How Many? Combining Object Detectors and CRFs
Abstract. Computer vision algorithms for individual tasks such as object recognition, detection and segmentation have shown impressive results in the recent past. The next challeng...