Sciweavers

428 search results - page 71 / 86
» Window Detection in Facades
Sort
View
NOLISP
2007
Springer
14 years 2 months ago
Phase-Based Methods for Voice Source Analysis
Voice source analysis is an important but difficult issue for speech processing. In this talk, three aspects of voice source analysis recently developed at LIMSI (Orsay, France) a...
Christophe d'Alessandro, Baris Bozkurt, Boris Dova...
RAID
2007
Springer
14 years 2 months ago
Vortex: Enabling Cooperative Selective Wormholing for Network Security Systems
We present a novel approach to remote traffic aggregation for Network Intrusion Detection Systems (NIDS) called Cooperative Selective Wormholing (CSW). Our approach works by select...
John R. Lange, Peter A. Dinda, Fabián E. Bu...
CRV
2005
IEEE
166views Robotics» more  CRV 2005»
14 years 2 months ago
Face as Mouse Through Visual Face Tracking
This paper introduces a novel camera mouse driven by 3D model based visual face tracking. While camera becomes standard configuration for personal computer(PC) and computer speed...
Jilin Tu, Thomas S. Huang, Hai Tao
ISESE
2005
IEEE
14 years 2 months ago
Cloning by accident: an empirical study of source code cloning across software systems
One of the key goals of open source development is the sharing of knowledge, experience, and solutions that pertain to a software system and its problem domain. Source code clonin...
Raihan Al-Ekram, Cory Kapser, Richard C. Holt, Mic...
SIGMETRICS
2004
ACM
115views Hardware» more  SIGMETRICS 2004»
14 years 2 months ago
Emulating low-priority transport at the application layer: a background transfer service
Low priority data transfer across the wide area is useful in several contexts, for example for the dissemination of large files such as OS updates, content distribution or prefet...
Peter B. Key, Laurent Massoulié, Bing Wang