Sciweavers

12257 search results - page 2208 / 2452
» Analysis of Algorithms
Sort
View
137
Voted
TIP
2008
157views more  TIP 2008»
15 years 3 months ago
Robust Face Tracking via Collaboration of Generic and Specific Models
Significant appearance changes of objects under different orientations could cause loss of tracking, "drifting." In this paper, we present a collaborative tracking framew...
Peng Wang, Qiang Ji
152
Voted
IVC
2007
104views more  IVC 2007»
15 years 3 months ago
Text segmentation in color images using tensor voting
In natural scene, text elements are corrupted by many types of noise, such as streaks, highlights, or cracks. These effects make the clean and automatic segmentation very difficu...
Jaeguyn Lim, Jonghyun Park, Gérard G. Medio...
151
Voted
BMCBI
2005
94views more  BMCBI 2005»
15 years 3 months ago
Workflows in bioinformatics: meta-analysis and prototype implementation of a workflow generator
Background: Computational methods for problem solving need to interleave information access and algorithm execution in a problem-specific workflow. The structures of these workflo...
Alexander García Castro, Samuel Thoraval, L...
148
Voted
JCC
2007
127views more  JCC 2007»
15 years 3 months ago
Prediction of GFP spectral properties using artificial neural network
Abstract: In this study, we applied artificial neural network, implementing the backpropagation algorithm, for the prediction of the excitation and emission maxima of green fluores...
Chanin Nantasenamat, Chartchalerm Isarankura-Na-Ay...
132
Voted
JCP
2007
148views more  JCP 2007»
15 years 3 months ago
P3ARM-t: Privacy-Preserving Protocol for Association Rule Mining with t Collusion Resistance
— The ability to mine large volumes of distributed datasets enables more precise decision making. However, privacy concerns should be carefully addressed when mining datasets dis...
Iman Saleh, Mohamed Eltoweissy
« Prev « First page 2208 / 2452 Last » Next »