Sciweavers

945 search results - page 157 / 189
» Detective Information Flow Analysis for Business Processes
Sort
View
EPIA
2009
Springer
14 years 16 days ago
Topic-Related Polarity Classification of Blog Sentences
Though polarity classification has been extensively explored at various text levels and domains, there has been only comparatively little work looking into topic-related polarity c...
Michael Wiegand, Dietrich Klakow
IEAAIE
1998
Springer
14 years 7 days ago
Applying Computer Vision Techniques to Traffic Monitoring Tasks
This paper presents a method I for tracking and segmenting vehicles in a traffic scene. The approach is based on a frame to frame segmentation followed by a tracking process. As op...
Jorge Badenas, Filiberto Pla
ICMCS
2006
IEEE
149views Multimedia» more  ICMCS 2006»
14 years 2 months ago
Semantic 3D Face Mesh Simplification for Transmission and Visualization
Three-dimensional data generated from range scanners is usually composed of a huge amount of information. Simplification and compression techniques must be adopted in order to red...
Alessandro Colombo, Claudio Cusano, Raimondo Schet...
ACMACE
2005
ACM
14 years 2 months ago
SymBall: camera driven table tennis for mobile phones
We present a table tennis game concept, implemented for Symbian OS/Series 60 mobile phones, using the phone's integrated camera as the main game controller. The game demonstr...
Mika Hakkarainen, Charles Woodward
MMSEC
2005
ACM
210views Multimedia» more  MMSEC 2005»
14 years 2 months ago
Composite signature based watermarking for fingerprint authentication
Digital watermarking is a technology to hide information in digital media. We extend the digital watermarking technique Phasemark™, originally developed solely for image authent...
Farid Ahmed, Ira S. Moskowitz