Sciweavers

1050 search results - page 43 / 210
» Two methods of authenticated positioning
Sort
View
106
Voted
CI
2006
101views more  CI 2006»
15 years 1 months ago
Sentiment Classification of Movie Reviews Using Contextual Valence Shifters
We present two methods for determining the sentiment expressed by a movie review. The semantic orientation of a review can be positive, negative, or neutral. We examine the effect...
Alistair Kennedy, Diana Inkpen
ICRA
2005
IEEE
119views Robotics» more  ICRA 2005»
15 years 7 months ago
Comparison of Alternate Methods for Distributed Motion Planning of Robot Collectives within a Potential Field Framework
– In this paper, we evaluate the performance of two candidate formulations for distributed motion planning of robot collectives within an Artificial Potential Field (APF) framewo...
Leng-Feng Lee, Rajankumar Bhatt, Venkat Krovi
ICMCS
2010
IEEE
171views Multimedia» more  ICMCS 2010»
15 years 2 months ago
Transforming a pattern identifier into biometric key generators
According to a popular pattern recognition method, this paper proposes two methods to generate a secret from individual's biometric information, such as fingerprint feature p...
Yongdong Wu, Bo Qiu
CVPR
2011
IEEE
14 years 9 months ago
Noise Resistant Graph Ranking for Improved Web Image Search
In this paper, we exploit a novel ranking mechanism that processes query samples with noisy labels, motivated by the practical application of web image search re-ranking where the...
Wei Liu, Yu-Gang Jiang, Jiebo Luo, Shih-Fu Chang
MVA
1990
208views Computer Vision» more  MVA 1990»
15 years 2 months ago
3-D Shape Reconstruction from Camera Motion with Inexact Motion Parameters
When a sequence of images are obtained by a moving camera, if the exact camera velocity and corresponding points on the images are determined, the 3-D shape of the object can be r...
Keisuke Kinoshita, Koichiro Deguchi