Sciweavers

1778 search results - page 299 / 356
» Building a Knowledge Base: An Example
Sort
View
101
Voted
GW
2009
Springer
195views Biometrics» more  GW 2009»
14 years 8 months ago
Continuous Realtime Gesture Following and Recognition
Abstract. We present a HMM based system for real-time gesture analysis. The system outputs continuously parameters relative to the gesture time progression and its likelihood. Thes...
Frédéric Bevilacqua, Bruno Zamborlin...
156
Voted
IJAC
2011
14 years 5 months ago
Bringing the Everyday Life into Engineering Education
— To successfully design and engineer solutions for today’s and tomorrow’s rapidly changing and expanding global contexts, in which people are confronted with new opportuniti...
Gert Pasman, Ingrid Mulder
135
Voted
TCOS
2010
14 years 5 months ago
J-PAKE: Authenticated Key Exchange without PKI
Password Authenticated Key Exchange (PAKE) is one of the important topics in cryptography. It aims to address a practical security problem: how to establish secure communication be...
Feng Hao, Peter Ryan
CVPR
2012
IEEE
13 years 20 days ago
From label fusion to correspondence fusion: A new approach to unbiased groupwise registration
Label fusion strategies are used in multi-atlas image segmentation approaches to compute a consensus segmentation of an image, given a set of candidate segmentations produced by r...
Paul A. Yushkevich, Hongzhi Wang, John Pluta, Bria...
72
Voted
HICSS
1997
IEEE
89views Biometrics» more  HICSS 1997»
15 years 2 months ago
Text Types in Hypermedia
The discipline of narratology has long recognized the need to classify documents as instances of different text types. We have discovered that classification is as applicable to h...
Stephen W. Smoliar, James D. Baker