Browsing by Title

Now showing items 3138-3157 of 4790

  • PEEK 

    Unknown author (1974-02-01)
    PEEK is a utility program designed to operate under the ITS time sharing system. It enables a user to monitor a variety of aspects of the time sharing system by providing, to the user, various periodically updated displays.

  • PEEK and LOCK 

    Unknown author (1968-11-01)
    This memo describes two small utility programs that are of assistance in using the ITS 1.4 (see A.I. 161, MAC-M-377) time sharing system. LOCK performs miscellaneous utility functions while PEEK displays, with periodic ...

  • Peer-to-peer systems for simple and flexible information sharing 

    Pather, Suhendran (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2009)
    Peer to peer computing (P2P) is an architecture that enables applications to access shared resources, with peers having similar capabilities and responsibilities. The ubiquity of P2P computing and its increasing adoption ...

  • People Recognition in Image Sequences by Supervised Learning 

    Unknown author (2000-06-01)
    We describe a system that learns from examples to recognize people in images taken indoors. Images of people are represented by color-based and shape-based features. Recognition is carried out through combinations of Support ...

  • Perceiving Illumination Inconsistencies in Scenes 

    Unknown author (2001-11-05)
    The human visual system is adept at detecting and encoding statistical regularities in its spatio-temporal environment. Here we report an unexpected failure of this ability in the context of perceiving inconsistencies in ...

  • The Perception of Subjective Surfaces 

    Unknown author (1981-11-01)
    It is proposed that subjective contours are an artifact of the perception of natural three-dimensional surfaces. A recent theory of surface interpolation implies that "subjective surfaces" are constructed in the visual ...

  • Perceptions of cloud computing in the South African government 

    Chetty, Deenadayalan (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2014)
    The South African government is unable to provide efficient Information Technology (IT) services to the citizens because of the fragmented approach in government where each department procures their own IT services and ...

  • The Perceptual Buildup of Three-Dimensional Structure from Motion 

    Unknown author (1989-08-01)
    We present psychophysical experiments that measure the accuracy of perceived 3D structure derived from relative image motion. The experiments are motivated by Ullman's incremental rigidity scheme, which builds up 3D ...

  • Perceptual Evaluation of Video-Realistic Speech 

    Unknown author (2003-02-28)
    abstract With many visual speech animation techniques now available, there is a clear need for systematic perceptual evaluation schemes. We describe here our scheme and its application to a new video-realistic ...

  • Perceptual Organization, Figure-Ground, Attention and Saliency 

    Unknown author (1991-08-01)
    Notions of figure-ground, inside-outside are difficult to define in a computational sense, yet seem intuitively meaningful. We propose that "figure" is an attention-directed region of visual information processing, and ...

  • Perceptual refinement for hierarchical radiosity 

    Secchia, Adrian (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2000)
    This dissertation explores the use of a simple model of the human visual system to yield a performance improvement with hierarchical radiosity. Hierarchical radiosity is a physically based rendering algorithm and hence ...

  • Perceptually-based Comparison of Image Similarity Metrics 

    Unknown author (2001-07-01)
    The image comparison operation ??sessing how well one image matches another ??rms a critical component of many image analysis systems and models of human visual processing. Two norms used commonly for this purpose are L1 ...

  • Perfect and General Virtual Implementation For Perfectly Informed Players 

    Unknown author (2009-12-04)
    We show that, when the players are perfectly informed about each other, essentially all social-choice functions can be rationally robustly implemented via an extensive-form public-action mechanism that (1) is perfectly ...

  • Perfect Implementation of Normal-Form Mechanisms 

    Unknown author (2005)
    Privacy and trust affect our strategic thinking, yet they have not been precisely modeled in mechanism design. In settings of incomplete information, traditional implementations of a normal-form mechanism ---by disregarding ...

  • Perfect Implementation of Normal-Form Mechanisms 

    Unknown author (2007-03)
    Privacy and trust affect our strategic thinking, yet they have not been precisely modeled in mechanism design. In settings of incomplete information, traditional implementations of a normal-form mechanism ---by disregarding ...

  • Performance and error analysis of three part of speech taggers on health texts 

    Unknown author (2010-02-25)
    Increasingly, natural language processing (NLP) techniques are being developed and utilized in a variety of biomedical domains. Part of speech tagging is a critical step in many NLP applications. Currently, we are developing ...

  • Performance benchmarking physical and virtual linux envrionments 

    Fisher, Mario (University of Cape TownFaculty of ScienceDepartment of Computer Science, 2012)
    Virtualisation is a method of partitioning one physical computer into multiple "virtual" computers, giving each the appearance and capabilities of running on its own dedicated hardware. Each virtual system functions as a ...

  • Performance Evaluation of Queue Processors Vs Risc Architecture 

    Maduagwu, Dorothy (2010-12-12)
    Nowadays, shifts in Hardware and Software technologies have forced designers and users to look at micro-architecture that process instructions stream with high performance and low power consumption. In Striving for such ...

  • Performance Evaluation of the Scheme 86 and HP Precision Architecture 

    Unknown author (1989-04-01)
    The Scheme86 and the HP Precision Architectures represent different trends in computer processor design. The former uses wide micro-instructions, parallel hardware, and a low latency memory interface. The latter ...

  • The Performance of a Mechanical Design 'Compiler' 

    Unknown author (1989-01-01)
    A mechanical design "compiler" has been developed which, given an appropriate schematic, specifications, and utility function for a mechanical design, returns catalog numbers for an optimal implementation. The compiler ...