Sciweavers

5948 search results - page 1121 / 1190
» Computing Robust Counter-Strategies
Sort
View
AINA
2008
IEEE
15 years 4 months ago
Senceive: A Middleware for a Wireless Sensor Network
— A significant amount of research effort is being carried out by the research community to increase the scope and usefulness of wireless sensor networks; to optimise life time ...
Christian Hermann, Waltenegus Dargie
CW
2008
IEEE
15 years 4 months ago
Bi-Manual Interactive Tools for Cultural Heritage Researchers
The availability of intuitive, user-friendly and specialized software to work with 3D models of cultural heritage artifacts is as important as the availability of low-cost and rob...
Can Ozmen, Selim Balcisoy
ECCB
2008
IEEE
15 years 4 months ago
Connect the dots: exposing hidden protein family connections from the entire sequence tree
Motivation: Mapping of remote evolutionary links is a classic computational problem of much interest. Relating protein families allows for functional and structural inference on u...
Yaniv Loewenstein, Michal Linial
ACIVS
2008
Springer
15 years 4 months ago
Crowd Behavior Recognition for Video Surveillance
Abstract. Crowd behavior recognition is becoming an important research topic in video surveillance for public places. In this paper, we first discuss the crowd feature selection a...
Shobhit Saxena, François Brémond, Mo...
AMFG
2007
IEEE
327views Biometrics» more  AMFG 2007»
15 years 4 months ago
Model-Assisted 3D Face Reconstruction from Video
Abstract. This paper describes a model-assisted system for reconstruction of 3D faces from a single consumer quality camera using a structure from motion approach. Typical multi-vi...
Douglas Fidaleo, Gérard G. Medioni
« Prev « First page 1121 / 1190 Last » Next »