Sciweavers

3770 search results - page 133 / 754
» Building a Stochastic Dynamic Model of Application Use
Sort
View
ADMA
2005
Springer
202views Data Mining» more  ADMA 2005»
13 years 11 months ago
A Latent Usage Approach for Clustering Web Transaction and Building User Profile
Web transaction data between web visitors and web functionalities usually convey users’ task-oriented behavior patterns. Clustering web transactions, thus, may capture such infor...
Yanchun Zhang, Guandong Xu, Xiaofang Zhou
ECAI
2010
Springer
13 years 10 months ago
Using Bayesian Networks in an Industrial Setting: Making Printing Systems Adaptive
Abstract. Control engineering is a field of major industrial importance as it offers principles for engineering controllable physical devices, such as cell phones, television sets,...
Arjen Hommersom, Peter J. F. Lucas
ICASSP
2009
IEEE
14 years 4 months ago
Instantaneous pose estimation using rotation vectors
An algorithm for estimating the pose, i.e., translation and rotation, of an extended target object is introduced. Compared to conventional methods, where pose estimation is perfor...
Frederik Beutler, Marco F. Huber, Uwe D. Hanebeck
ICMCS
2005
IEEE
78views Multimedia» more  ICMCS 2005»
14 years 2 months ago
Partial Linear Regression for Audio-Driven Talking Head Application
Virtual avatars in many applications are constructed manually or by a single speech-driven model which needs a lot of training data and long training time. It’s an essential pro...
Chao-Kuei Hsieh, Yung-Chang Chen
ACISP
2004
Springer
14 years 2 months ago
Protocols with Security Proofs for Mobile Applications
The Canetti-Krawczyk (CK) model is useful for building reusable components that lead to rapid development of secure protocols, especially for engineers working outside of the secur...
Yiu Shing Terry Tin, Harikrishna Vasanta, Colin Bo...