Sciweavers

1527 search results - page 274 / 306
» Hidden word statistics
Sort
View
IJCV
2007
148views more  IJCV 2007»
14 years 11 months ago
Detection and Tracking of Multiple Metallic Objects in Millimetre-Wave Images
Abstract In this paper we present a system for the automatic detection and tracking of metallic objects concealed on moving people in sequences of millimetre-wave (MMW) images. The...
Christopher D. Haworth, Yves de Saint-Pern, D. Cla...
SIGPRO
2008
151views more  SIGPRO 2008»
14 years 11 months ago
An adaptive penalized maximum likelihood algorithm
The LMS algorithm is one of the most popular learning algorithms for identifying an unknown system. Many variants of the algorithm have been developed based on different problem f...
Guang Deng, Wai-Yin Ng
SOCA
2008
IEEE
14 years 11 months ago
Log-based mining techniques applied to Web service composition reengineering
There is no doubt that SOA and BPM will continue to evolve dependently for the next ten years. Preparing common research infrastructures will require most important efforts of web ...
Walid Gaaloul, Karim Baïna, Claude Godart
IJON
2007
166views more  IJON 2007»
14 years 11 months ago
Kernel PCA for similarity invariant shape recognition
We present in this paper a novel approach for shape description based on kernel principal component analysis (KPCA). The strength of this method resides in the similarity (rotatio...
Hichem Sahbi
TCOM
2008
124views more  TCOM 2008»
14 years 11 months ago
Reliable adaptive modulation and interference mitigation for mobile radio slow frequency hopping channels
: Due to correlated fading in frequency hopping (FH) wireless communication systems, it is possible to predict the future channel state information (CSI) for one frequency based on...
Ming Lei, Alexandra Duel-Hallen, Hans Hallen