Results 1 - 10
of
3,225
Neural Network-Based Face Detection
- IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE
, 1998
"... We present a neural network-based upright frontal face detection system. A retinally connected neural network examines small windows of an image and decides whether each window contains a face. The system arbitrates between multiple networks to improve performance over a single network. We present ..."
Abstract
-
Cited by 1206 (22 self)
- Add to MetaCart
We present a neural network-based upright frontal face detection system. A retinally connected neural network examines small windows of an image and decides whether each window contains a face. The system arbitrates between multiple networks to improve performance over a single network. We present
Detection and Tracking of Point Features
- International Journal of Computer Vision
, 1991
"... The factorization method described in this series of reports requires an algorithm to track the motion of features in an image stream. Given the small inter-frame displacement made possible by the factorization approach, the best tracking method turns out to be the one proposed by Lucas and Kanade i ..."
Abstract
-
Cited by 629 (2 self)
- Add to MetaCart
in 1981. The method defines the measure of match between fixed-size feature windows in the past and current frame as the sum of squared intensity differences over the windows. The displacement is then defined as the one that minimizes this sum. For small motions, a linearization of the image intensities
Fast subsequence matching in time-series databases
- PROCEEDINGS OF THE 1994 ACM SIGMOD INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA
, 1994
"... We present an efficient indexing method to locate 1-dimensional subsequences within a collection of sequences, such that the subsequences match a given (query) pattern within a specified tolerance. The idea is to map each data sequence into a small set of multidimensional rectangles in feature space ..."
Abstract
-
Cited by 533 (24 self)
- Add to MetaCart
We present an efficient indexing method to locate 1-dimensional subsequences within a collection of sequences, such that the subsequences match a given (query) pattern within a specified tolerance. The idea is to map each data sequence into a small set of multidimensional rectangles in feature
Practical Byzantine fault tolerance and proactive recovery
- ACM Transactions on Computer Systems
, 2002
"... Our growing reliance on online services accessible on the Internet demands highly available systems that provide correct service without interruptions. Software bugs, operator mistakes, and malicious attacks are a major cause of service interruptions and they can cause arbitrary behavior, that is, B ..."
Abstract
-
Cited by 410 (7 self)
- Add to MetaCart
, it incorporates mechanisms to defend against Byzantine-faulty clients, and it recovers replicas proactively. The recovery mechanism allows the algorithm to tolerate any number of faults over the lifetime of the system provided fewer than 1/3 of the replicas become faulty within a small window of vulnerability
Small Window Effect: Lessons from Mobile Service Engineering
"... Abstract—The Internet business has been characterized by its dynamism. The fast and reliable communication infrastructure itself has driven the fast and dynamic changes. This dynamism makes the static analysis of business model engineering a challenge. Key factors have exercised the filtering of bus ..."
Abstract
- Add to MetaCart
of business models. However, the retrospective analysis of such a factor does not bring useful foresights for the future business. The author analyzes the lessons learned in the past business model engineering in the Internet. Then, the author proposes a concept of small window effect in order to capture
Scalable TCP: Improving Performance in Highspeed Wide Area Networks
- ACM SIGCOMM Computer Communication Review
, 2002
"... TCP congestion control can perform badly in highspeed wide area networks because of its slow response with large congestion windows. The challenge for any alternative protocol is to better utilize networks with high bandwidth-delay products in a simple and robust manner without interacting badly wit ..."
Abstract
-
Cited by 373 (0 self)
- Add to MetaCart
identically to traditional TCP stacks when small windows are sufficient. The performance of the scheme is evaluated through experimental results gathered using a Scalable TCP implementation for the Linux operating system and a gigabit transatlantic network. The results gathered suggest that the deployment
Small Window Overlaps Are Effective Probes of Replica Symmetry Breaking in 3D Spin Glasses
, 1998
"... We compute numerically small window overlaps in the three dimensional Edwards Anderson spin glass. We show that they behave in the way implied by the Replica Symmetry Breaking Ansatz, that they do not qualitatively differ from the full volume overlap and do not tend to a trivial function when increa ..."
Abstract
- Add to MetaCart
We compute numerically small window overlaps in the three dimensional Edwards Anderson spin glass. We show that they behave in the way implied by the Replica Symmetry Breaking Ansatz, that they do not qualitatively differ from the full volume overlap and do not tend to a trivial function when
Quantized AVF: A Means of Capturing Vulnerability Variations over Small Windows of Time
- In IEEE Workshop on Silicon Errors in Logic - System Effects
, 2009
"... Abstract — Architectural vulnerability factor (AVF) is the probability that a transient fault in a bit, gate, or transistor becomes a user-visible error. AVFs vary widely across time, applications, and bits. Usually AVFs averaged over time and across applications are used to compute the overall soft ..."
Abstract
-
Cited by 5 (2 self)
- Add to MetaCart
. By capturing vulnerability variations over short windows of time, Q-AVFs provide better opportunities for reducing the performance and power overhead of reliability solutions at run-time. To compute Q-AVF in hardware, linear regression analysis is used to create highly accurate equations that can
Window Help”.
"... To begin a Bibliography file, at the system prompt type bibview&. A small window will pop up with a menu across the top. This window is called the main window. The menu across the top is “File Services Options ..."
Abstract
- Add to MetaCart
To begin a Bibliography file, at the system prompt type bibview&. A small window will pop up with a menu across the top. This window is called the main window. The menu across the top is “File Services Options
Shape and motion from image streams: a factorization method - 2. point features in 3d motion.
, 1991
"... Abstract The factorization method described in this series of reports requires an algorithm to track the motion of features in an image stream. Given the small inter-frame displacement made possible by the factorization approach, the best tracking method turns out to be the one proposed by Lucas an ..."
Abstract
-
Cited by 219 (13 self)
- Add to MetaCart
and Kanade in 1981. The method defines the measure of match between fixed-size feature windows in the past and current frame as the sum of squared intensity differences over the windows. The displacement is then defined as the one that minimizes this sum. For small motions, a linearization of the image
Results 1 - 10
of
3,225