Sciweavers

3072 search results - page 583 / 615
» Shape analysis algorithm based on information theory
Sort
View
ICMI
2004
Springer
152views Biometrics» more  ICMI 2004»
15 years 3 months ago
Exploiting prosodic structuring of coverbal gesticulation
Although gesture recognition has been studied extensively, communicative, affective, and biometrical “utility” of natural gesticulation remains relatively unexplored. One of t...
Sanshzar Kettebekov
ICRA
2002
IEEE
92views Robotics» more  ICRA 2002»
15 years 2 months ago
Resolution Complete Rapidly-Exploring Random Trees
Trajectory design for high-dimensional systems with nonconvex constraints is a challenging problem considered in this paper. Classical dynamic programming is often employed, but c...
Peng Cheng, Steven M. LaValle
MM
2009
ACM
168views Multimedia» more  MM 2009»
15 years 2 months ago
Identifying news videos' ideological perspectives using emphatic patterns of visual concepts
Television news has become the predominant way of understanding the world around us, but individual news broadcasters can frame or mislead an audience’s understanding of politic...
Wei-Hao Lin, Alexander G. Hauptmann
PAKDD
2000
ACM
140views Data Mining» more  PAKDD 2000»
15 years 1 months ago
Performance Controlled Data Reduction for Knowledge Discovery in Distributed Databases
The objective of data reduction is to obtain a compact representation of a large data set to facilitate repeated use of non-redundant information with complex and slow learning alg...
Slobodan Vucetic, Zoran Obradovic
ISQED
2010
IEEE
156views Hardware» more  ISQED 2010»
14 years 11 months ago
On the design of different concurrent EDC schemes for S-Box and GF(p)
Recent studies have shown that an attacker can retrieve confidential information from cryptographic hardware (e.g. the secret key) by introducing internal faults. A secure and re...
Jimson Mathew, Hafizur Rahaman, Abusaleh M. Jabir,...