Sciweavers

303 search results - page 56 / 61
» Gaussian Process Change Point Models
Sort
View
79
Voted
HICSS
2005
IEEE
125views Biometrics» more  HICSS 2005»
15 years 3 months ago
Taking Topic Detection From Evaluation to Practice
Abstract— The Topic Detection and Tracking (TDT) research community investigates information retrieval methods for organizing a constantly arriving stream of news articles by the...
James Allan, Stephen M. Harding, David Fisher, Alv...
CANDC
2005
ACM
14 years 11 months ago
Computational schemes for biomimetic sculpture
A prototype system for the automatic evolution of biomimetic structures using structural automata is described and its utility for generating digital sculpture is demonstrated. Sc...
Brower Hatcher, Karl Aspelund, Andrew R. Willis, J...
IJCV
1998
233views more  IJCV 1998»
14 years 9 months ago
A Level-Set Approach to 3D Reconstruction from Range Data
This paper presents a method that uses the level sets of volumes to reconstruct the shapes of 3D objects from range data. The strategy is to formulate 3D reconstruction as a stati...
Ross T. Whitaker
JMM2
2007
218views more  JMM2 2007»
14 years 9 months ago
A Novel Method for 3D Face Detection and Normalization
—When automatically analyzing images of human faces, either for recognition in biometry applications or facial expression analysis in human machine interaction, one has to cope w...
Robert Niese, Ayoub Al-Hamadi, Bernd Michaelis
ESEM
2010
ACM
14 years 8 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams