Sciweavers

2838 search results - page 156 / 568
» Verifying Controlled Components
Sort
View
ICPR
2004
IEEE
14 years 11 months ago
Human Action Segmentation via Controlled Use of Missing Data in HMMs
Segmentation of individual actions from a stream of human motion is an open problem in computer vision. This paper approaches the problem of segmenting higher-level activities int...
Patrick Peursum, Hung Hai Bui, Svetha Venkatesh, G...
MOBILITY
2009
ACM
14 years 4 months ago
Detection of images with adult content for parental control on mobile devices?
In this paper we present a prototype for parental control that detects images with adult content received on a mobile device. More specifically, the application that we developed...
Giuseppe Amato, Paolo Bolettieri, Gabriele Costa, ...
ICDIM
2007
IEEE
14 years 4 months ago
An access control video watermarking method that is robust to geometric distortions
: A new video watermarking algorithm for access control is introduced. This method is content-dependent and uses the dual tree complex wavelet transform (DT CWT) to create a waterm...
Lino Coria-Mendoza, Panos Nasiopoulos, Rabab Kreid...
IWPC
2006
IEEE
14 years 4 months ago
Improving Comprehensibility of Source Code via Traceability Information: a Controlled Experiment
The presence of traceability links between software artefacts is very important to achieve high comprehensibility and maintainability. This is confirmed by several researches and ...
Andrea De Lucia, Rocco Oliveto, Francesco Zurolo, ...
DSVIS
2005
Springer
14 years 3 months ago
Goal-Oriented Design of Domain Control Panels
Goal-oriented methodologies have demonstrated some adequacy for modelling composite systems, from high level desired properties to operational requirements on responsible agents. T...
Christophe Ponsard, Nadiya Balych, Philippe Masson...