Sciweavers

1050 search results - page 92 / 210
» Two methods of authenticated positioning
Sort
View
FSTTCS
2004
Springer
15 years 7 months ago
Subdividing Alpha Complex
Abstract. Given two simplicial complexes C1 and C2 embedded in Euclidean space IRd , C1 subdivides C2 if (i) C1 and C2 have the same underlying space, and (ii) every simplex in C1 ...
Ho-Lun Cheng, Tony Tan
ICDAR
2003
IEEE
15 years 7 months ago
Automatic Classification of Hand Drawn Geometric Shapes using Constructional Sequence Analysis
A method for automatically assessing the constructional sequence from a neuropsychological drawing task using Hidden Markov Models is presented. We also present a method of extrac...
Richard M. Guest, Samuel Chindaro, Michael C. Fair...
UIST
2003
ACM
15 years 7 months ago
Considering the direction of cursor movement for efficient traversal of cascading menus
Cascading menus are commonly seen in most GUI systems. However, people sometimes choose the wrong items by mistake, or become frustrated when submenus pop up unnecessarily. This p...
Masatomo Kobayashi, Takeo Igarashi
90
Voted
AIIA
2003
Springer
15 years 7 months ago
Image-Based Monte-Carlo Localisation without a Map
In this paper, we propose a way to fuse the image-based localisation approach with the Monte-Carlo localisation approach. The method we propose does not suffer of the major limitat...
Emanuele Menegatti, Mauro Zoccarato, Enrico Pagell...
DICTA
2003
15 years 3 months ago
Synthesising Textures Using Variable Neighbourhood Searching
Abstract. Texture synthesis aims to define and reproduce discriminating image features. These features are used to associate with and differentiate between two textures. Often tex...
Minh Tran, Amitava Datta