Sciweavers

3377 search results - page 439 / 676
» Describing differences between databases
Sort
View
MVA
2007
196views Computer Vision» more  MVA 2007»
15 years 3 months ago
Fingerprint Verification Using Perturbation Method
This paper describes a new, powerful technique of fingerprint verification based on a perturbation method. The proposed method consists of four parts. The first part performs loca...
Satoshi Otaka, Yoshihisa Nishiyama, Takahiro Hatan...
132
Voted
DICTA
2003
15 years 3 months ago
Face Recognition Based on Multiple Region Features
For face recognition, face feature selection is an important step. Better features should result in better performance. This paper describes a robust face recognition algorithm usi...
Jiaming Li, Geoff Poulton, Ying Guo, Rong-yu Qiao
NIPS
2004
15 years 3 months ago
Modeling Conversational Dynamics as a Mixed-Memory Markov Process
In this work, we quantitatively investigate the ways in which a given person influences the joint turn-taking behavior in a conversation. After collecting an auditory database of ...
Tanzeem Choudhury, Sumit Basu
ACL
1998
15 years 3 months ago
The Berkeley FrameNet Project
FrameNet is a three-year NSF-supported project in corpus-based computational lexicography, now in its second year NSF IRI-9618838, Tools for Lexicon Building". The project�...
Collin F. Baker, Charles J. Fillmore, John B. Lowe
ISMB
1993
15 years 3 months ago
Knowledge Discovery in GENBANK
Wedescribe various methods designed to discover knowledge in the GenBanknucleic acid sequence database. Using a grammatical model of gene structure, we create a parse tree of a ge...
Jeffery S. Aaronson, Juergen Haas, G. Christian Ov...