Sciweavers

5675 search results - page 72 / 1135
» Exploiting Chaos for Computation
Sort
View
ICPR
2010
IEEE
15 years 4 months ago
Exploiting Visual Quasi-Periodicity for Automated Chewing Event Detection Using Active Appearance Models and Support Vector Mach
We present a method that automatically detects chewing events in surveillance video of a subject. Firstly, an Active Appearance Model (AAM) is used to track a subject’s face acr...
Steven Cadavid, Mohamed Abdel-Mottaleb
SAC
2009
ACM
15 years 4 months ago
Exploiting weak dependencies in tree-based search
In this work, our objective is to heuristically discover a simplified form of functional dependencies between variables called weak dependencies. Once discovered, these relations...
Alejandro Arbelaez, Youssef Hamadi
WIMOB
2009
IEEE
15 years 4 months ago
Exploiting RF-Scatter: Human Localization with Bistatic Passive UHF RFID-Systems
—In ubiquitous computing, localization of users in indoor environments is a challenging issue. On the one hand, localization data needs to have fine granularity to provide reaso...
Dominik Lieckfeldt, Jiaxi You, Dirk Timmermann
ISVC
2009
Springer
15 years 4 months ago
Exploiting Mutual Camera Visibility in Multi-camera Motion Estimation
Abstract. This paper addresses the estimation of camera motion and 3D reconstruction from image sequences for multiple independently moving cameras. If multiple moving cameras reco...
Christian Kurz, Thorsten Thormählen, Bodo Ros...
AINA
2008
IEEE
15 years 4 months ago
Improvement of User Authentication Using Schema of Visual Memory: Exploitation of "Schema of Story"
A user authentication system using "unclear images" as pass-images has been proposed, in which only legitimate users can understand their meaning by viewing the original...
Takumi Yamamoto, Atsushi Harada, Takeo Isarida, Ma...