Sciweavers

1717 search results - page 96 / 344
» Error concealment using a diffusion based method
Sort
View
WACV
2005
IEEE
15 years 3 months ago
Ensemble Methods in the Clustering of String Patterns
We address the problem of clustering of contour images from hardware tools based on string descriptions, in a comparative study of cluster combination techniques. Several clusteri...
André Lourenço, Ana L. N. Fred
CCE
2004
14 years 9 months ago
On the use of reduced order models in bifurcation analysis of distributed parameter systems
Bifurcation theory provides a powerful tool for analyzing the nonlinear dynamic behavior of process systems. However, although the theory in principle applies to lumped as well as...
Yi Liu, Elling W. Jacobsen
VR
2008
IEEE
136views Virtual Reality» more  VR 2008»
15 years 4 months ago
Uncertainty Boundaries for Complex Objects in Augmented Reality
Registration errors between the physical world and computergenerated objects are a central problem in Augmented Reality (AR) systems. Some existing AR systems have demonstrated ho...
Jiajian Chen, Blair MacIntyre
ICWSM
2009
14 years 7 months ago
Content Based Recommendation and Summarization in the Blogosphere
This paper presents a stochastic graph based method for recommending or selecting a small subset of blogs that best represents a much larger set. within a certain topic. Each blog...
Ahmed Hassan, Dragomir R. Radev, Junghoo Cho, Amru...
IVIC
2009
Springer
15 years 4 months ago
Secure Minutiae-Based Fingerprint Templates Using Random Triangle Hashing
Abstract. Due to privacy concern on the widespread use of biometric authentication systems, biometric template protection has gained great attention in the biometric research recen...
Zhe Jin, Andrew Beng Jin Teoh, Thian Song Ong, Con...