Sciweavers

1581 search results - page 269 / 317
» Competitive intelligence process and tools for intelligence ...
Sort
View
SIGGRAPH
1999
ACM
13 years 12 months ago
Voice Puppetry
We introduce a method for predicting a control signal from another related signal, and apply it to voice puppetry: Generating full facial animation from expressive information in ...
Matthew Brand
ICVS
1999
Springer
13 years 12 months ago
Face-Tracking and Coding for Video Compression
While computing power and transmission bandwidth have both been steadily increasing over the last few years, bandwidth rather than processing power remains the primary bottleneck f...
William E. Vieux, Karl Schwerdt, James L. Crowley
SOCA
2008
IEEE
13 years 7 months ago
Log-based mining techniques applied to Web service composition reengineering
There is no doubt that SOA and BPM will continue to evolve dependently for the next ten years. Preparing common research infrastructures will require most important efforts of web ...
Walid Gaaloul, Karim Baïna, Claude Godart

Publication
283views
12 years 6 months ago
Security and Surveillance
Human eyes are highly efficient devices for scanning through a large quantity of low-level visual sensory data and delivering selective information to one’s brain for high-level...
Shaogang Gong, Chen Change Loy, Tao Xiang
KDD
2007
ACM
167views Data Mining» more  KDD 2007»
14 years 8 months ago
Multiscale topic tomography
Modeling the evolution of topics with time is of great value in automatic summarization and analysis of large document collections. In this work, we propose a new probabilistic gr...
Ramesh Nallapati, Susan Ditmore, John D. Lafferty,...