Sciweavers

415 search results - page 47 / 83
» Intruders pattern identification
Sort
View
ICPR
2000
IEEE
15 years 2 months ago
Segmentation and Surface Characterization of Arbitrary 3D Meshes for Object Reconstruction and Recognition
Polygonal models are the most common representation of structured 3D data in computer graphics, pattern recognition and machine vision. The method presented here automatically ide...
Georgios Papaioannou, Evaggelia-Aggeliki Karabassi...
ICPR
2004
IEEE
15 years 11 months ago
Using Adapted Levenshtein Distance for On-Line Signature Authentication
In this paper a new method for on-line signature authentication will be presented, which is based on a event-string modelling of features derived from pen-position and pressure si...
Sascha Schimke, Claus Vielhauer, Jana Dittmann
HAPTICS
2006
IEEE
15 years 3 months ago
Towards Effective Information Display Using Vibrotactile Apparent Motion
In this paper, we explore the use of tactile apparent motion at different speeds for information display. A prototype vibrotactile tactor array was constructed, consisting of thre...
Luv Kohli, Masataka Niwa, Haruo Noma, Kenji Susami...
CIARP
2007
Springer
15 years 1 months ago
An Analysis of Automatic Gender Classification
Different researches suggest that inner facial features are not the only discriminative features for tasks such as person identification or gender classification. Indeed, they have...
Modesto Castrillón Santana, Quoc C. Vuong
CNSR
2004
IEEE
180views Communications» more  CNSR 2004»
15 years 1 months ago
The Reconstruction of User Sessions from a Server Log Using Improved Time-Oriented Heuristics
Web usage mining plays an important role in the personalization of Web services, adaptation of Web sites, and the improvement of Web server performance. It applies data mining tec...
Jie Zhang, Ali A. Ghorbani