Sciweavers

5615 search results - page 905 / 1123
» Active Learner Modelling
Sort
View
GAMEON
2009
15 years 1 months ago
Analysis of User Trajectories Based on Data Distribution and State Transition: a Case Study with a Massively Multiplayer Online
At present, trajectory data, series of coordinate data traversed by moving objects, can be readily obtained due to the advent of positioning technologies. Clustering of trajectori...
Ruck Thawonmas, Junichi Oda, Kuan-Ta Chen
ICASSP
2009
IEEE
15 years 1 months ago
Social correlates of turn-taking behavior
The goal of this research is to infer traits about groups of people from their turn-taking behavior in natural conversation. These traits are latent attributes in a social network...
John Grothendieck, Allen L. Gorin, Nash M. Borges
ICCV
2009
IEEE
15 years 1 months ago
Face alignment through subspace constrained mean-shifts
Deformable model fitting has been actively pursued in the computer vision community for over a decade. As a result, numerous approaches have been proposed with varying degrees of ...
Jason M. Saragih, Simon Lucey, Jeffrey F. Cohn
ICEGOV
2009
ACM
15 years 1 months ago
Design of a web-based tendering system for e-government procurement
Procurement for e-Government is an important part of activities which are similar to the nature of B2B. That is usually characterized by bulk volumes with complex variables, burea...
Simon Fong, Zhuang Yan
ISCI
2010
146views more  ISCI 2010»
15 years 1 months ago
Simulatable certificateless two-party authenticated key agreement protocol
Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key agreement (AKA) is a KA protocol enhanced to preve...
Lei Zhang 0009, Futai Zhang, Qianhong Wu, Josep Do...