Sciweavers

988 search results - page 77 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
PG
1999
IEEE
15 years 2 months ago
On-line Motion Retargetting
This paper presents a method to retarget the motion of a character to another in real-time. The technique is based on inverse rate control, which computes the changes in joint ang...
Kwang-Jin Choi, Hyeong-Seok Ko
COCOON
2008
Springer
14 years 11 months ago
Spreading Messages
Abstract. We model a network in which messages spread by a simple directed graph G = (V, E) [1] and a function : V N mapping each v V to a positive integer less than or equal to...
Ching-Lueh Chang, Yuh-Dauh Lyuu
IJNSEC
2008
109views more  IJNSEC 2008»
14 years 9 months ago
A Multi-band Wavelet Watermarking Scheme
This paper presents a new multi-band wavelet watermarking scheme. Compared with conventional watermarking schemes implemented in two-band wavelet domain, by incorporating the prin...
Xiangui Kang, Wenjun Zeng, Jiwu Huang
IS
2007
14 years 9 months ago
Improving process models by discovering decision points
Workflow management systems (WfMS) are widely used by business enterprises as tools for administrating, automating and scheduling the business process activities with the availab...
Sharmila Subramaniam, Vana Kalogeraki, Dimitrios G...
PAMI
2010
238views more  PAMI 2010»
14 years 8 months ago
Tracking Motion, Deformation, and Texture Using Conditionally Gaussian Processes
—We present a generative model and inference algorithm for 3D nonrigid object tracking. The model, which we call G-flow, enables the joint inference of 3D position, orientation, ...
Tim K. Marks, John R. Hershey, Javier R. Movellan