Sciweavers

2144 search results - page 296 / 429
» Understanding Document Analysis and Understanding (through M...
Sort
View
MM
2003
ACM
146views Multimedia» more  MM 2003»
15 years 10 months ago
Supporting timeliness and accuracy in distributed real-time content-based video analysis
Real-time content-based access to live video data requires content analysis applications that are able to process the video data at least as fast as the video data is made availab...
Viktor S. Wold Eide, Frank Eliassen, Ole-Christoff...
DAS
2008
Springer
15 years 6 months ago
A Robust System to Detect and Localize Texts in Natural Scene Images
In this paper, we present a robust system to accurately detect and localize texts in natural scene images. For text detection, a region-based method utilizing multiple features an...
Yi-Feng Pan, Xinwen Hou, Cheng-Lin Liu
ICECCS
1998
IEEE
168views Hardware» more  ICECCS 1998»
15 years 9 months ago
The Architecture Tradeoff Analysis Method
This paper presents the Architecture Tradeoff Analysis Method (ATAM), a structured technique for understanding the tradeoffs inherent in design. This method was developed to provi...
Rick Kazman, Mark H. Klein, Mario Barbacci, Thomas...
INFSOF
2007
116views more  INFSOF 2007»
15 years 4 months ago
An analysis of the most cited articles in software engineering journals - 2000
Citations and related work are crucial in any research to position the work and to build on the work of others. A high citation count is an indication of the influence of speciï¬...
Claes Wohlin
SACMAT
2009
ACM
15 years 11 months ago
Symbolic reachability analysis for parameterized administrative role based access control
Role based access control (RBAC) is a widely used access control paradigm. In large organizations, the RBAC policy is managed by multiple administrators. An administrative role ba...
Scott D. Stoller, Ping Yang, Mikhail I. Gofman, C....