Sciweavers

4526 search results - page 687 / 906
» An overview of clustering methods
Sort
View
102
Voted
ISCAS
2005
IEEE
171views Hardware» more  ISCAS 2005»
15 years 6 months ago
Compressed-domain fall incident detection for intelligent home surveillance
—This paper presents a compressed-domain fall incident detection scheme for intelligent home surveillance applications. For object extraction, global motion parameters are estima...
Chia-Wen Lin, Zhi-Hong Ling, Yuan-Cheng Chang, Chu...
84
Voted
ISWC
2005
IEEE
15 years 6 months ago
Detection of eating and drinking arm gestures using inertial body-worn sensors
We propose a two-stage recognition system for detecting arm gestures related to typical meal intake. Information retrieved from such a system can be used for automatic dietary mon...
Oliver Amft, Holger Junker, Gerhard Tröster
103
Voted
ITCC
2005
IEEE
15 years 6 months ago
Energy Balanced Broadcasting Through Delayed Intelligence
— Ad hoc wireless networks are growing in popularity and usefulness, however they rely on broadcasting as a fundamental process for routing. Improvements to broadcasting have mad...
Michael R. Gosnell, Ryan Albarelli, Maggie Xiaoyan...
VISSOFT
2005
IEEE
15 years 6 months ago
Exploring Relations within Software Systems Using Treemap Enhanced Hierarchical Graphs
The clear and meaningful visualization of relations between software entities is an invaluable tool for the comprehension, evaluation, and reengineering of the structure of existi...
Michael Balzer, Oliver Deussen
84
Voted
IUI
2005
ACM
15 years 6 months ago
User intentions funneled through a human-robot interface
We describe a method for predicting user intentions as part of a human-robot interface. In particular, we show that funnels, i.e., geometric objects that partition the input space...
Michael T. Rosenstein, Andrew H. Fagg, Shichao Ou,...