Sciweavers

1050 search results - page 43 / 210
» Two methods of authenticated positioning
Sort
View
CI
2006
101views more  CI 2006»
14 years 12 months ago
Sentiment Classification of Movie Reviews Using Contextual Valence Shifters
We present two methods for determining the sentiment expressed by a movie review. The semantic orientation of a review can be positive, negative, or neutral. We examine the effect...
Alistair Kennedy, Diana Inkpen
ICRA
2005
IEEE
119views Robotics» more  ICRA 2005»
15 years 5 months ago
Comparison of Alternate Methods for Distributed Motion Planning of Robot Collectives within a Potential Field Framework
– In this paper, we evaluate the performance of two candidate formulations for distributed motion planning of robot collectives within an Artificial Potential Field (APF) framewo...
Leng-Feng Lee, Rajankumar Bhatt, Venkat Krovi
ICMCS
2010
IEEE
171views Multimedia» more  ICMCS 2010»
15 years 26 days ago
Transforming a pattern identifier into biometric key generators
According to a popular pattern recognition method, this paper proposes two methods to generate a secret from individual's biometric information, such as fingerprint feature p...
Yongdong Wu, Bo Qiu
CVPR
2011
IEEE
14 years 7 months ago
Noise Resistant Graph Ranking for Improved Web Image Search
In this paper, we exploit a novel ranking mechanism that processes query samples with noisy labels, motivated by the practical application of web image search re-ranking where the...
Wei Liu, Yu-Gang Jiang, Jiebo Luo, Shih-Fu Chang
MVA
1990
208views Computer Vision» more  MVA 1990»
15 years 29 days ago
3-D Shape Reconstruction from Camera Motion with Inexact Motion Parameters
When a sequence of images are obtained by a moving camera, if the exact camera velocity and corresponding points on the images are determined, the 3-D shape of the object can be r...
Keisuke Kinoshita, Koichiro Deguchi