Sciweavers

1898 search results - page 363 / 380
» Weak Keys for IDEA
Sort
View
JMM2
2006
212views more  JMM2 2006»
13 years 8 months ago
K-means Tracker: A General Algorithm for Tracking People
Abstract-- In this paper, we present a clustering-based tracking algorithm for tracking people (e.g. hand, head, eyeball, body, and lips). It is always a challenging task to track ...
Chunsheng Hua, Haiyuan Wu, Qian Chen, Toshikazu Wa...
ENVSOFT
2007
96views more  ENVSOFT 2007»
13 years 8 months ago
Next Generation GRIDs for environmental science
Abstract: GRIDs technology has developed from first generation, supplier-specific and configurationspecific systems through second generation systems providing metacomputing facili...
Keith G. Jeffery
JUCS
2006
89views more  JUCS 2006»
13 years 8 months ago
Process Equivalences as Global Bisimulations
: Bisimulation can be defined in a simple way using coinductive methods, and has rather pleasant properties. Ready similarity was proposed by Meyer et al. as a way to weakening the...
David de Frutos-Escrig, Carlos Gregorio-Rodr&iacut...
SCN
2008
Springer
136views Communications» more  SCN 2008»
13 years 8 months ago
An efficient data structure for network anomaly detection
Abstract-- Despite the rapid advance in networking technologies, detection of network anomalies at high-speed switches/routers is still far from maturity. To push the frontier, two...
Jieyan Fan, Dapeng Wu, Kejie Lu, Antonio Nucci
IIE
2007
85views more  IIE 2007»
13 years 8 months ago
Half-Baked Logo Microworlds as Boundary Objects in Integrated Design
The paper addresses the problem of fragmentation of the communities involved in the design of digital media for education. It draws on the experience gained at the Educational Tec...
Chronis Kynigos