Sciweavers

1717 search results - page 230 / 344
» Error concealment using a diffusion based method
Sort
View
ISPASS
2008
IEEE
15 years 4 months ago
Program Phase Detection based on Critical Basic Block Transitions
Many programs go through phases as they execute. Knowing where these phases begin and end can be beneficial. For example, adaptive architectures can exploit such information to lo...
Paruj Ratanaworabhan, Martin Burtscher
CLEAR
2007
Springer
175views Biometrics» more  CLEAR 2007»
15 years 4 months ago
The IBM RT07 Evaluation Systems for Speaker Diarization on Lecture Meetings
We present the IBM systems for the Rich Transcription 2007 (RT07) speaker diarization evaluation task on lecture meeting data. We first overview our baseline system that was devel...
Jing Huang, Etienne Marcheret, Karthik Visweswaria...
IPSN
2004
Springer
15 years 3 months ago
Distributed online localization in sensor networks using a moving target
We describe a novel method for node localization in a sensor network where there are a fraction of reference nodes with known locations. For application-specific sensor networks, ...
Aram Galstyan, Bhaskar Krishnamachari, Kristina Le...
ICPR
2006
IEEE
15 years 11 months ago
Tracking 3D Human Body using Particle Filter in Moving Monocular Camera
In this paper, we propose a method for human tracking using 3D human body model in a video sequence with a monocular moving camera. Tracking a human with unconstrained movement in...
Sungmin Kim, Chang-Beom Park, Seong-Whan Lee
HRI
2006
ACM
15 years 4 months ago
Using context and sensory data to learn first and second person pronouns
We present a method of grounded word learning that is powerful enough to learn the meanings of first and second person pronouns. The model uses the understood words in an utteran...
Kevin Gold, Brian Scassellati