Sciweavers

328 search results - page 61 / 66
» Detecting Occlusion for Hidden Markov Modeled Shapes
Sort
View
UAI
2003
13 years 8 months ago
Renewal Strings for Cleaning Astronomical Databases
Large astronomical databases obtained from sky surveys such as the SuperCOSMOS Sky Surveys (SSS) invariably suffer from spurious records coming from artefactual effects of the t...
Amos J. Storkey, Nigel C. Hambly, Christopher K. I...
CEE
2010
119views more  CEE 2010»
13 years 7 months ago
Block-matching-based motion field generation utilizing directional edge displacement
A motion field generation algorithm using block matching of edge-flag histograms has been developed aiming at its application to motion recognition systems. Use of edge flags inste...
Hitoshi Hayakawa, Tadashi Shibata
JMLR
2002
133views more  JMLR 2002»
13 years 7 months ago
Learning Precise Timing with LSTM Recurrent Networks
The temporal distance between events conveys information essential for numerous sequential tasks such as motor control and rhythm detection. While Hidden Markov Models tend to ign...
Felix A. Gers, Nicol N. Schraudolph, Jürgen S...
KES
2008
Springer
13 years 5 months ago
Classification of Sporadic and BRCA1 Ovarian Cancer Based on a Genome-Wide Study of Copy Number Variations
Abstract. Motivation: Although studies have shown that genetic alterations are causally involved in numerous human diseases, still not much is known about the molecular mechanisms ...
Anneleen Daemen, Olivier Gevaert, Karin Leunen, Va...
IDEAL
2010
Springer
13 years 5 months ago
Trajectory Based Behavior Analysis for User Verification
Many of our activities on computer need a verification step for authorized access. The goal of verification is to tell apart the true account owner from intruders. We propose a gen...
Hsing-Kuo Pao, Hong-Yi Lin, Kuan-Ta Chen, Junaidil...