Sciweavers

5962 search results - page 885 / 1193
» Working with Patterns and Code
Sort
View
PAMI
2007
121views more  PAMI 2007»
15 years 4 months ago
Person Authentication Using Brainwaves (EEG) and Maximum A Posteriori Model Adaptation
— In this paper, we investigate the use of brain activity for person authentication. It has been shown in previous studies that the brain-wave pattern of every individual is uniq...
Sébastien Marcel, José del R. Mill&a...
PR
2007
100views more  PR 2007»
15 years 4 months ago
Estimation of skew angles for scanned documents based on piecewise covering by parallelograms
We propose a fast and robust skew estimation method for scanned documents that estimates skew angles based on piecewise covering of objects, such as textlines, figures, forms, or...
Chien-Hsing Chou, Shih-Yu Chu, Fu Chang
RE
2008
Springer
15 years 4 months ago
Information Brokers in Requirement-Dependency Social Networks
Requirements interdependencies create technical dependencies among project members that generally belong to different functional groups in an organization, but who need to coordin...
Sabrina Marczak, Daniela Damian, Ulrike Stege, Adr...
CCGRID
2010
IEEE
15 years 3 months ago
An Adaptive Data Prefetcher for High-Performance Processors
—While computing speed continues increasing rapidly, data-access technology is lagging behind. Data-access delay, not the processor speed, becomes the leading performance bottlen...
Yong Chen, Huaiyu Zhu, Xian-He Sun
CORR
2008
Springer
192views Education» more  CORR 2008»
15 years 3 months ago
Anomaly Detection in Streaming Sensor Data
In this chapter we consider a cell phone network as a set of automatically deployed sensors that records movement and interaction patterns of the population. We discuss methods fo...
Alec Pawling, Ping Yan, Julián Candia, Timo...