Sciweavers

1956 search results - page 271 / 392
» A Gesture Recognition System Using 3D Data
Sort
View
DICTA
2007
13 years 10 months ago
Biometric Based Cryptographic Key Generation from Faces
Existing asymmetric encryption algorithms require the storage of the secret private key. Stored keys are often protected by poorly selected user passwords that can either be guess...
B. Chen, V. Chandran
LREC
2008
138views Education» more  LREC 2008»
13 years 10 months ago
Bridging the Gap between Linguists and Technology Developers: Large-Scale, Sociolinguistic Annotation for Dialect and Speaker Re
Recent years have seen increased interest within the speaker recognition community in high-level features including, for example, lexical choice, idiomatic expressions or syntacti...
Christopher Cieri, Stephanie Strassel, Meghan Lamm...
ECAI
2010
Springer
13 years 10 months ago
Human Activity Recognition in Intelligent Home Environments: An Evolving Approach
In this paper, we propose an automated approach to track and recognize daily activities. Any activity is represented in this research as a sequence of raw sensors data. These seque...
José Antonio Iglesias, Plamen P. Angelov, A...
IJCV
2007
159views more  IJCV 2007»
13 years 8 months ago
Monocular Vision for Mobile Robot Localization and Autonomous Navigation
This paper presents a new real-time localization system for a mobile robot. We show that autonomous navigation is possible in outdoor situation with the use of a single camera and ...
Eric Royer, Maxime Lhuillier, Michel Dhome, Jean-M...
WCRE
1993
IEEE
14 years 1 months ago
Flexible Control for Program Recognition
Recognizing commonly used data structures and algorithms is a key activity in reverse engineering. Systems developed to automate this recognition process have been isolated, stand...
Linda M. Wills