Sciweavers

415 search results - page 76 / 83
» Intruders pattern identification
Sort
View
ECOOP
2005
Springer
15 years 3 months ago
Attached Types and Their Application to Three Open Problems of Object-Oriented Programming
The three problems of the title — the first two widely discussed in the literature, the third less well known but just as important for further development of object technology ...
Bertrand Meyer
MIR
2004
ACM
154views Multimedia» more  MIR 2004»
15 years 3 months ago
Fast and robust short video clip search using an index structure
In this paper, we present an index structure-based method to fast and robustly search short video clips in large video collections. First we temporally segment a given long video ...
Junsong Yuan, Ling-Yu Duan, Qi Tian, Changsheng Xu
ICRA
2003
IEEE
110views Robotics» more  ICRA 2003»
15 years 3 months ago
Modelling of the human paralysed lower limb under FES
— The new generation of implanted neuroprostheses allows muscles to be controlled with fine accuracy, high selectivity and the repeatability of the muscle’s response can be ach...
David Guiraud, Philippe Poignet, Pierre-Brice Wieb...
ICPR
2010
IEEE
15 years 2 months ago
Detecting Altered Fingerprints
Abstract--The widespread deployment of Automated Fingerprint Identification Systems (AFIS) in law enforcement and border control applications has heightened the need for ensuring t...
Jianjiang Feng, Anil Jain, Arun Ross
CSB
2004
IEEE
164views Bioinformatics» more  CSB 2004»
15 years 1 months ago
Biclustering in Gene Expression Data by Tendency
The advent of DNA microarray technologies has revolutionized the experimental study of gene expression. Clustering is the most popular approach of analyzing gene expression data a...
Jinze Liu, Jiong Yang, Wei Wang 0010