Sciweavers

7296 search results - page 1277 / 1460
» informs 2010
Sort
View
156
Voted
CVIU
2010
104views more  CVIU 2010»
15 years 4 months ago
Pose estimation from multiple cameras based on Sylvester's equation
In this paper, we introduce a method to estimate the object's pose from multiple cameras. We focus on direct estimation of the 3D object pose from 2D image sequences. Scale-I...
Chong Chen, Dan Schonfeld
DKE
2010
101views more  DKE 2010»
15 years 4 months ago
Effective pruning for XML structural match queries
Extensible Markup Language (XML) is becoming the de facto standard for exchanging information over the Internet, which results in the proliferation of XML documents. This has led ...
Yefei Xin, Zhen He, Jinli Cao
ECRA
2010
111views more  ECRA 2010»
15 years 4 months ago
RDRP: Reward-Driven Request Prioritization for e-Commerce web sites
Meeting client Quality-of-Service (QoS) expectations proves to be a difficult task for the providers of e-Commerce services, especially when web servers experience overload condit...
Alexander Totok, Vijay Karamcheti
166
Voted
EM
2010
155views Management» more  EM 2010»
15 years 4 months ago
Hyperbolic Graphs of Small Complexity
In this paper we enumerate and classify the "simplest" pairs (M, G) where M is a closed orientable 3-manifold and G is a trivalent graph embedded in M. To enumerate the p...
Damian Heard, Craig Hodgson, Bruno Martelli, Carlo...
DSS
2006
140views more  DSS 2006»
15 years 4 months ago
Access control and audit model for the multidimensional modeling of data warehouses
Due to the sensitive data contained in Data Warehouses (DW), it is essential to specify security measures from the early stages of the DW design and enforce them. Traditional acce...
Eduardo Fernández-Medina, Juan Trujillo, Ro...
« Prev « First page 1277 / 1460 Last » Next »