Sciweavers

587 search results - page 82 / 118
» Information Consistency of Nonparametric Gaussian Process Me...
Sort
View
ICMCS
2005
IEEE
169views Multimedia» more  ICMCS 2005»
15 years 3 months ago
Automatic 3D Face Recognition Using Topological Techniques
In this paper, we use the three-dimensionaltopological shape information for human face identification. We propose a new method to represent 3D faces as a topological graph. Fine...
Chafik Samir, Jean-Philippe Vandeborre, Mohamed Da...
VMV
2001
115views Visualization» more  VMV 2001»
14 years 11 months ago
Segmentation-Based Postprocessing in Real-Time Immersive Video Conferencing
We present a novel, real-time disparity analysis frame work developed for immersive teleconferencing. This two-stage method computes a limited number of highly reliable disparitie...
Oliver Schreer, Serap Askar, Nicole Brandenburg, P...
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
15 years 4 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
IRI
2005
IEEE
15 years 3 months ago
Knowledge representation for product design using Techspecs Concept Ontology
Sharing and reusing product design information can help reduce cost and time when developing new products and facilitate good product family design. An appropriate representation ...
Seung Ki Moon, Soundar R. T. Kumara, Timothy W. Si...
ICMAS
2000
14 years 11 months ago
Assessing Usage Patterns to Improve Data Allocation via Auctions
The data allocation problem in incomplete information environments consisting of self-motivated servers responding to users' queries is considered. Periodically, the servers ...
Rina Azoulay-Schwartz, Sarit Kraus