Sciweavers

1891 search results - page 212 / 379
» Constrained Subspace Modelling
Sort
View
123
Voted
SMA
2006
ACM
132views Solid Modeling» more  SMA 2006»
15 years 9 months ago
Generalized penetration depth computation
— We present an efficient algorithm to compute the generalized penetration depth (PDg) between rigid models. Given two overlapping objects, our algorithm attempts to compute the...
Liangjun Zhang, Young J. Kim, Gokul Varadhan, Dine...
113
Voted
ICCV
2005
IEEE
15 years 9 months ago
Priors for People Tracking from Small Training Sets
We advocate the use of Scaled Gaussian Process Latent Variable Models (SGPLVM) to learn prior models of 3D human pose for 3D people tracking. The SGPLVM simultaneously optimizes a...
Raquel Urtasun, David J. Fleet, Aaron Hertzmann, P...
152
Voted
CBSE
2004
Springer
15 years 9 months ago
Introducing a Component Technology for Safety Critical Embedded Real-Time Systems
Safety critical embedded real-time systems represent a class of systems that has attracted relatively little attention in research addressing component based software engineering. ...
Kristian Sandström, Johan Fredriksson, Mikael...
142
Voted
EMNLP
2004
15 years 5 months ago
Bilingual Parsing with Factored Estimation: Using English to Parse Korean
We describe how simple, commonly understood statistical models, such as statistical dependency parsers, probabilistic context-free grammars, and word-to-word translation models, c...
David A. Smith, Noah A. Smith
126
Voted
WSC
2001
15 years 5 months ago
Simulation of rare events in transportation systems
Prior to the deployment of any new or replacement component within a transportation system, it should be demonstrated that the modified system meets or exceeds the safety requirem...
Lori M. Kaufman, Ted C. Giras