Sciweavers

1652 search results - page 63 / 331
» Matching Vector Codes
Sort
View
102
Voted
SGP
2007
15 years 5 months ago
Fast normal vector compression with bounded error
We present two methods for lossy compression of normal vectors through quantization using "base" polyhedra. The first revisits subdivision-based quantization. The second...
Eric J. Griffith, Michal Koutek, Frits H. Post
113
Voted
ESANN
2007
15 years 4 months ago
Bat echolocation modelling using spike kernels with Support Vector Regression
Abstract. From the echoes of their vocalisations bats extract information about the positions of reflectors. To gain an understanding of how target position is translated into neu...
Bertrand Fontaine, Herbert Peremans, Benjamin Schr...
112
Voted
IFIP12
2007
15 years 4 months ago
Patient Fall Detection using Support Vector Machines
This paper presents a novel implementation of a patient fall detection system that may be used for patient activity recognition and emergency treatment. Sensors equipped with accel...
Charalampos Doukas, Ilias Maglogiannis, Philippos ...
125
Voted
IAJIT
2010
140views more  IAJIT 2010»
15 years 1 months ago
HW/SW Design-Based Implementation of Vector Median Rational Hybrid Filter
: A new code sign implementation of vector median rational hybrid filter based on efficient hardware/software implementation is introduced and applied to colour image filtering pro...
Anis Boudabous, Ahmed Ben Atitallah, Lazhar Khriji...
118
Voted
DIMVA
2009
15 years 3 months ago
Yataglass: Network-Level Code Emulation for Analyzing Memory-Scanning Attacks
Remote code-injection attacks are one of the most frequently used attacking vectors in computer security. To detect and analyze injected code (often called shellcode), some researc...
Makoto Shimamura, Kenji Kono