Sciweavers

1080 search results - page 133 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
CIVR
2004
Springer
121views Image Analysis» more  CIVR 2004»
15 years 3 months ago
Assessing Scene Structuring in Consumer Videos
Abstract. Scene structuring is a video analysis task for which no common evaluation procedures have been fully adopted. In this paper, we present a methodology to evaluate such tas...
Daniel Gatica-Perez, Napat Triroj, Jean-Marc Odobe...
ICCV
2007
IEEE
15 years 11 months ago
Real-Time Visibility-Based Fusion of Depth Maps
We present a viewpoint-based approach for the quick fusion of multiple stereo depth maps. Our method selects depth estimates for each pixel that minimize violations of visibility ...
Paul Merrell, Amir Akbarzadeh, Liang Wang, Philipp...
CHI
2007
ACM
15 years 10 months ago
An eye tracking study of the effect of target rank on web search
Web search engines present search results in a rank ordered list. This works when what a user wants is near the top, but sometimes the information that the user really wants is lo...
Zhiwei Guan, Edward Cutrell
BMCBI
2006
124views more  BMCBI 2006»
14 years 9 months ago
HybGFS: a hybrid method for genome-fingerprint scanning
Background: Protein identification based on mass spectrometry (MS) has previously been performed using peptide mass fingerprinting (PMF) or tandem MS (MS/MS) database searching. H...
Kosaku Shinoda, Nozomu Yachie, Takeshi Masuda, Nao...
BMCBI
2004
100views more  BMCBI 2004»
14 years 9 months ago
Handling multiple testing while interpreting microarrays with the Gene Ontology Database
Background: The development of software tools that analyze microarray data in the context of genetic knowledgebases is being pursued by multiple research groups using different me...
Michael V. Osier, Hongyu Zhao, Kei-Hoi Cheung