Sciweavers

1050 search results - page 34 / 210
» Two methods of authenticated positioning
Sort
View
ICDAR
2003
IEEE
15 years 5 months ago
An HMM On-line Signature Verifier Incorporating Signature Trajectories
Authentication of individuals is rapidly becoming an important issue. On-line signature verification is one of the methods that use biometric features. This paper proposes a new H...
Daigo Muramatsu, Takashi Matsumoto
60
Voted
WACV
2002
IEEE
15 years 4 months ago
A model-driven method of estimating the state of clothes for manipulating it
Aiming at manipulating clothes, a model-driven method of estimating the state of hanging clothes is proposed. We suppose a system consisting of two manipulators and a camera. The ...
Yasuyo Kita, Nobuyuki Kita
114
Voted
ICPR
2000
IEEE
16 years 25 days ago
A Quick 3D-2D Registration Method for a Wide-Range of Applications
Amethod for quick determination of the position and pose of a 3D free-form object with respect to its 2D projective image(s) is proposed. It is a precondition of the method that a...
Yasuyo Kita, Nobuyuki Kita, Dale L. Wilson, J. Ali...
CEC
2008
IEEE
15 years 6 months ago
A contour method in population-based stochastic algorithms
—Inspired by the contours in topography, this paper proposes a contour method for the population-based stochastic algorithms to solve the problems with continuous variables. Rely...
Ying Lin, Jun Zhang, Lu-kai Lan
89
Voted
ICIP
1997
IEEE
16 years 1 months ago
Surrounding Region Dependence Method for Detection of Clustered Microcalcifications on Mammograms
Clustered microcalcifications on X-ray mammograms are an important feature in the detection of breast cancer. For the detection of the clustered microcalcifications on digitized m...
Jong-Kook Kim, Hyun Wook Park