Sciweavers

5948 search results - page 1013 / 1190
» Computing Robust Counter-Strategies
Sort
View
ESCIENCE
2006
IEEE
15 years 9 months ago
Building Simple, Easy-to-Use Grids with Styx Grid Services and SSH
Grid systems have a reputation for being difficult to build and use. We describe how the ease of use of the Styx Grid Services (SGS) software can be combined with the security and...
J. D. Blower, K. Haines
138
Voted
FGR
2006
IEEE
112views Biometrics» more  FGR 2006»
15 years 9 months ago
Self Correcting Tracking for Articulated Objects
Hand detection and tracking play important roles in human computer interaction (HCI) applications, as well as surveillance. We propose a self initializing and self correcting trac...
M. Baris Caglar, Niels da Vitoria Lobo
113
Voted
ICDM
2006
IEEE
98views Data Mining» more  ICDM 2006»
15 years 9 months ago
What is the Dimension of Your Binary Data?
Many 0/1 datasets have a very large number of variables; however, they are sparse and the dependency structure of the variables is simpler than the number of variables would sugge...
Nikolaj Tatti, Taneli Mielikäinen, Aristides ...
234
Voted
ICDM
2006
IEEE
145views Data Mining» more  ICDM 2006»
15 years 9 months ago
Stability Region Based Expectation Maximization for Model-based Clustering
In spite of the initialization problem, the ExpectationMaximization (EM) algorithm is widely used for estimating the parameters in several data mining related tasks. Most popular ...
Chandan K. Reddy, Hsiao-Dong Chiang, Bala Rajaratn...
126
Voted
ICMCS
2006
IEEE
371views Multimedia» more  ICMCS 2006»
15 years 9 months ago
Automatic Counting of Interacting People by using a Single Uncalibrated Camera
Automatic counting of people, entering or exiting a region of interest, is very important for both business and security applications. This paper introduces an automatic and robus...
Senem Velipasalar, Ying-li Tian, Arun Hampapur
« Prev « First page 1013 / 1190 Last » Next »