Browsing 08 Information and Computing Sciences by Title

DSpace/Manakin Repository

Search OPUS


Advanced Search

Browse

My Account

Browsing 08 Information and Computing Sciences by Title

Sort by: Order: Results:

  • Wang, M; Zhu, L; Chen, J (2012)
    Scientific workflows are generally computing- and data-intensive with large volume of data generated during their execution. Therefore, some of the data should be saved to avoid the expensive re-execution of tasks in case ...
  • Demong, NA; Lu, J (Springer, 2012-01)
    Investment in the real estate industry is subject to high risk, especially when there are a large number of uncertainty factors in a project. Risk analysis has been widely used to make decisions for real estate investment. ...
  • Zhang, C; Tao, D (Microtome Publ, 2013-01)
    Levy processes refer to a class of stochastic processes, for example, Poisson processes and Brownian motions, and play an important role in stochastic processes and machine learning. Therefore, it is essential to study ...
  • Hussain, O; Chang, E; Soh, B; Dillon, TS (IEEE, 2005-01)
    Risk is associated with almost every activity that is undertaken on a daily life. Risk associated with Trust, Security and Privacy. Risk is associated with transactions, businesses, information systems, environments, ...
  • Lu, J; Jain, LC; Zhang, G (2012)
    Organizational decision making often occurs in the face of uncertainty about whether a decision maker's choices will lead to benefit or disaster. Risk is the potential that a decision will lead to a loss or an undesirable ...
  • Lin, H; Zhang, G (Springer Berlin Heidelberg, 2012-01)
    Customer Attrition is a function of customer transaction and service related characteristics and also a combination of cancellation and switching to a competitor. This paper first presents a risk prediction framework for ...
  • Wijesoma, WS; Kodagoda, KRS; Balasuriya, AP; Challa, S (IEEE Computer Society, 2003)
    Road detection and tracking is very useful in the synthesis of driver assistance and intelligent transportation systems. In this paper a methodology is proposed based on the extended Kalman filer for robust road curb ...
  • Mao, R; Mao, G (IEEE, 2013-01)
  • Ha, QP; Rye, D (The Institute of Electrical and Electronic Engineers, Inc., 2001-01)
  • Dissanayake, G; Paxman, JP; Valls Miro, J; Thane, O; Thi, H (IEEE, 2006-01)
    This paper describes a team of robots that are designed for urban search and rescue applications. The team CASualty consists of four tele-operated robots and one autonomous robot. A brief description of the capabilities ...
  • Du, H; Zhang, N (IEEE, 2009-01)
    This paper presents a robust control approach for semi-active suspensions with electrorheological (ER) dampers considering system parameter uncertainties and control input constraint. By representing the suspension with ...
  • Moghaddam, Z; Piccardi, M (IEEE Computer Society, 2011-01)
    The extraction of human features from videos is often inaccurate and prone to outliers. Such outliers can severely affect density modelling when the Gaussian distribution is used as the model since it is highly sensitive ...
  • Kannan, AA; Fidan, B; Mao, G (IEEE, 2008-01)
    A major problem in wireless sensor network localization is erroneous local geometric realizations in some parts of the network due to the sensitivity to certain distance measurement errors, which may in turn affect the ...
  • Deng, C; Gao, X; Li, X; Tao, D (Springer-Verlag Berlin / Heidelberg, 2011-01)
    Abstract. In image watermarking, binding the watermark synchronization with the local features has been widely used to provide robustness against geometric distortions as well as common image processing operations. However, ...
  • Sehestedt, S; Kodagoda, S; Alempijevic, A; Dissanayake, G (IEEE, 2007-01-01)
  • An, L; Gao, X; Yuan, Y; Tao, D (Elsevier Science Bv, 2012-01)
    Lossless data hiding methods usually fail to recover the hidden messages completely when the watermarked images are attacked. Therefore, the robust lossless data hiding (RLDH), or the robust reversible watermarking technique, ...
  • Xu, R; Allen, J; Jin, J (IEEE, 2004-01)
    We propose a novel adaptive approach for object tracking using fast colour thresholding and region merging. It proves to be an effective measure against large variations between consecutive frames during a mean-shift ...
  • Gong, Chen; Fu, Kr; Tu, Em; Yang, Jie; He, Sean (IS&T & SPIE, 2013)
    Object tracking is widely used in many applications such as intelligent surveillance, scene understanding, and behavior analysis. Graph-based semisupervised learning has been introduced to deal with specific tracking ...
  • Sehestedt, S; Kodagoda, S; Dissanayake, G (2011)
    For effective Human Robot Interaction (HRI), it is necessary for the robot to be aware of its human peers and be able to anticipate and predict their actions. This paper explores an improved strategy for people tracking ...
  • An, L; Gao, X; Li, X; Tao, D; Deng, C; Li, J (2012-08)
    Robust reversible watermarking (RRW) methods are popular in multimedia for protecting copyright, while preserving intactness of host images and providing robustness against unintentional attacks. However, conventional RRW ...