Sciweavers

APSEC
2010
IEEE
13 years 6 months ago
Quantitative Analysis of Best Practices Models in the Software Domain
Organizations are adopting multiple best practices models to improve overall performance. Their objective is to capture the cumulative added value of each model into one single env...
André L. Ferreira, Ricardo Jorge Machado, M...
AMC
2010
84views more  AMC 2010»
13 years 6 months ago
Fluctuations in a SIS epidemic model with variable size population
In an epidemiological model, time spent in one compartment is often modeled by a delay in the model. In general the presence of delay in differential equations can change the stab...
Abderrhaman Iggidr, K. Niri, E. Ould Moulay Ely
ACCV
2010
Springer
13 years 6 months ago
PTZ Camera Modeling and Panoramic View Generation via Focal Plane Mapping
We present a novel technique to accurately map the complete field-of-coverage of a camera to its pan-tilt space in an efficient manner. This camera model enables mapping the coordi...
Karthik Sankaranarayanan, James W. Davis
ACCV
2010
Springer
13 years 6 months ago
Continuous Surface-Point Distributions for 3D Object Pose Estimation and Recognition
We present a 3D, probabilistic object-surface model, along with mechanisms for probabilistically integrating unregistered 2.5D views into the model, and for segmenting model instan...
Renaud Detry, Justus H. Piater
CVPR
2011
IEEE
13 years 7 months ago
Random Field Topic Model for Semantic Region Analysis in Crowded Scenes from Tracklets
In this paper, a Random Field Topic (RFT) model is proposed for semantic region analysis from motions of objects in crowded scenes. Different from existing approaches of learning ...
Bolei Zhou, Xiaogang Wang
DATE
2010
IEEE
139views Hardware» more  DATE 2010»
13 years 8 months ago
A general mathematical model of probabilistic ripple-carry adders
Probabilistic CMOS is considered a promising technology for future generations of computing devices. By embracing possibly incorrect calculations, the technology makes it possible ...
Mark S. K. Lau, Keck Voon Ling, Yun-Chung Chu, Aru...
COMPSAC
2010
IEEE
13 years 8 months ago
Security in Context: Analysis and Refinement of Software Architectures
Security analysis methods can provide correct yet meaningless results if the assumptions underlying the model do not conform to reality. We present an approach to analyze the secur...
Thomas Heyman, Riccardo Scandariato, Wouter Joosen
CIKM
2010
Springer
13 years 8 months ago
A late fusion approach to cross-lingual document re-ranking
The field of information retrieval still strives to develop models which allow semantic information to be integrated in the ranking process to improve performance in comparison to...
Dong Zhou, Séamus Lawless, Jinming Min, Vin...
IPPS
2010
IEEE
13 years 8 months ago
A simple thermal model for multi-core processors and its application to slack allocation
Abstract--Power density and heat density of multicore processor system are increasing exponentially with Moore's Law. High temperature on chip greatly affects its reliability,...
Zhe Wang, Sanjay Ranka
IJRR
2010
125views more  IJRR 2010»
13 years 8 months ago
Mechanics of Flexible Needles Robotically Steered through Soft Tissue
The tip asymmetry of a bevel-tip needle results in the needle naturally bending when it is inserted into soft tissue. This enables robotic needle steering, which can be used in me...
Sarthak Misra, Kyle B. Reed, Benjamin W. Schafer, ...