Sciweavers

2517 search results - page 81 / 504
» Specifying Weak Sets
Sort
View
ECCV
2006
Springer
15 years 7 months ago
Recognition and Segmentation of 3-D Human Action Using HMM and Multi-class AdaBoost
Our goal is to automatically segment and recognize basic human actions, such as stand, walk and wave hands, from a sequence of joint positions or pose angles. Such recognition is d...
Fengjun Lv, Ramakant Nevatia
158
Voted
RIAO
2007
15 years 6 months ago
From Layout to Semantic: a Reranking Model for Mapping Web Documents to Mediated XML Representations
Many documents on the Web are formated in a weakly structured format. Because of their weak semantic and because of the heterogeneity of their formats, the information conveyed by...
Guillaume Wisniewski, Patrick Gallinari
ACID
2006
239views Algorithms» more  ACID 2006»
15 years 6 months ago
Stable Marriage with Ties and Bounded Length Preference Lists
We consider variants of the classical stable marriage problem in which preference lists may contain ties, and may be of bounded length. Such restrictions arise naturally in practic...
Robert W. Irving, David Manlove, Gregg O'Malley
136
Voted
IPL
2006
87views more  IPL 2006»
15 years 5 months ago
Strongly secure ramp secret sharing schemes for general access structures
Ramp secret sharing (SS) schemes can be classified into strong ramp SS schemes and weak ramp SS schemes. The strong ramp SS schemes do not leak out any part of a secret explicitly...
Mitsugu Iwamoto, Hirosuke Yamamoto
JSYML
2007
97views more  JSYML 2007»
15 years 5 months ago
Sublocales in formal topology
The paper studies how the localic notion of sublocale transfers to formal topology. For any formal topology (not necessarily with positivity predicate) we define a sublocale to b...
Steven Vickers