Sciweavers

270 search results - page 43 / 54
» On Modeling Variations for Face Authentication
Sort
View
WSC
2007
14 years 12 months ago
Using empirical demand data and common random numbers in an agent-based simulation of a distribution network
Agent-based simulation provides a methodology to investigate complex systems behavior, such as supply chains, while incorporating many empirical elements relative to both systems ...
William J. Sawaya
ICCV
2005
IEEE
15 years 11 months ago
Probabilistic Contour Extraction Using Hierarchical Shape Representation
In this paper, we address the issue of extracting contour of the object with a specific shape. A hierarchical graphical model is proposed to represent shape variations. A complex ...
Xin Fan, Chun Qi, Dequn Liang, Hua Huang
74
Voted
RAS
2010
104views more  RAS 2010»
14 years 8 months ago
A hybrid controller based on the egocentric perceptual principle
In this paper we extend the control methodology based on Extended Markov Tracking (EMT) by providing the control algorithm with capabilities to calibrate and even partially recons...
Zinovi Rabinovich, Nicholas R. Jennings
ICASSP
2008
IEEE
15 years 4 months ago
An instantaneous vector representation of delta pitch for speaker-change prediction in conversational dialogue systems
As spoken dialogue systems become deployed in increasingly complex domains, they face rising demands on the naturalness of interaction. We focus on system responsiveness, aiming t...
Kornel Laskowski, Jens Edlund, Mattias Heldner
99
Voted
GCC
2004
Springer
15 years 3 months ago
Trust Establishment in Large Scale Grid Settings
Trust establishment is hard in grid architecture by the ad hoc nature. To set up trust in large scale of network is more difficult. In this paper, we propose an automatic key manag...
Bo Zhu, Tieyan Li, Huafei Zhu, Mohan S. Kankanhall...