Sciweavers

1050 search results - page 159 / 210
» Two methods of authenticated positioning
Sort
View
CVPR
2010
IEEE
15 years 10 months ago
Monocular 3D Pose Estimation and Tracking by Detection
Automatic recovery of 3D human pose from monocular image sequences is a challenging and important research topic with numerous applications. Although current methods are able to r...
Mykhaylo Andriluka, Stefan Roth, Bernt Schiele
CHI
2010
ACM
15 years 8 months ago
Contravision: exploring users' reactions to futuristic technology
How can we best explore the range of users' reactions when developing future technologies that maybe controversial, such as personal healthcare systems? Our approach – Cont...
Clara Mancini, Yvonne Rogers, Arosha K. Bandara, T...
ICC
2009
IEEE
207views Communications» more  ICC 2009»
15 years 8 months ago
Energy Efficient Collision Aware Multipath Routing for Wireless Sensor Networks
—Multipath routing can reduce the need for route updates, balance the traffic load and increase the data transfer rate in a wireless sensor network, improving the utilization of ...
Zijian Wang, Eyuphan Bulut, Boleslaw K. Szymanski
ICDAR
2009
IEEE
15 years 8 months ago
Statistical Modeling and Learning for Recognition-Based Handwritten Numeral String Segmentation
This paper proposes a recognition based approach to handwritten numeral string segmentation. We consider two classes: numeral strings segmented correctly or not. The feature vecto...
Yanjie Wang, Xiabi Liu, Yunde Jia
RECSYS
2009
ACM
15 years 8 months ago
FeedbackTrust: using feedback effects in trust-based recommendation systems
With the advent of online social networks, the trust-based approach to recommendation has emerged which exploits the trust network among users and makes recommendations based on t...
Samaneh Moghaddam, Mohsen Jamali, Martin Ester, Ja...