Sciweavers

178 search results - page 33 / 36
» An Analysis of (Linear) Exponentials Based on Extended Seque...
Sort
View
NIPS
2004
13 years 9 months ago
A Three Tiered Approach for Articulated Object Action Modeling and Recognition
Visual action recognition is an important problem in computer vision. In this paper, we propose a new method to probabilistically model and recognize actions of articulated object...
Le Lu, Gregory D. Hager, Laurent Younes
SIAMSC
2008
167views more  SIAMSC 2008»
13 years 7 months ago
New Finite Elements for Large-Scale Simulation of Optical Waves
We present a new method to simulate optical waves in large geometries. This method is based on newly developed finite elements, so-called Trigonometric Finite Wave Elements (TFWEs)...
Britta Heubeck, Christoph Pflaum, Gunther Steinle
JMIV
1998
130views more  JMIV 1998»
13 years 7 months ago
Topological Numbers and Singularities in Scalar Images: Scale-Space Evolution Properties
Singular points of scalar images in any dimensions are classified by a topological number. This number takes integer values and can efficiently be computed as a surface integral ...
Stiliyan Kalitzin, Bart M. ter Haar Romeny, Alfons...
JMLR
2010
195views more  JMLR 2010»
13 years 6 months ago
Online Learning for Matrix Factorization and Sparse Coding
Sparse coding—that is, modelling data vectors as sparse linear combinations of basis elements—is widely used in machine learning, neuroscience, signal processing, and statisti...
Julien Mairal, Francis Bach, Jean Ponce, Guillermo...
RFIDSEC
2010
13 years 6 months ago
The Poulidor Distance-Bounding Protocol
RFID authentication protocols are susceptible to different types of relay attacks such as mafia and distance frauds. A countermeasure against these types of attacks are the well-...
Rolando Trujillo-Rasua, Benjamin Martin 0002, Gild...