Sciweavers

1663 search results - page 159 / 333
» Computer Security in the Real World
Sort
View
CVPR
1998
IEEE
15 years 7 months ago
Appearance Based Behavior Recognition by Event Driven Selective Attention
Most of behavior recognition methods proposed so far share the limitations of bottom-up analysis, and singleobject assumption; the bottom-up analysis can be confused by erroneous ...
Toshikazu Wada, Takashi Matsuyama
127
Voted
HHCI
2000
15 years 7 months ago
The Sense of Object-Presence with Projection-Augmented Models
Projection-augmented models are a type of non-immersive, coincident haptic and visual display that uses a physical model as a three dimensional screen for projected visual informa...
Brett Stevens, Jennifer Jerrams-Smith
PPSN
1998
Springer
15 years 7 months ago
Comparison of Evolutionary Algorithms for Design Optimization
The production of specimen for microsystems or microcomponents is both, time and material-consuming. In a traditional design process the number of possible variations which can be ...
Wilfried Jakob, Martina Gorges-Schleuter, Ingo Sie...
USM
2000
15 years 7 months ago
Virtual Malls for Web Commerce: Observations and Case Study
In the real world there seem to be essential differences between shops, tourist offices, city halls, theatres and museums. However, when we try to design virtual environments allow...
Anton Nijholt
BMVC
2001
15 years 6 months ago
An EM-like Algorithm for Motion Segmentation via Eigendecomposition
This paper presents an iterative maximum likelihood framework for motion segmentation via the pairwise checking of pixel blocks. We commence from a characterisation of the motion ...
Antonio Robles-Kelly, Edwin R. Hancock