Sciweavers

204 search results - page 32 / 41
» Environment Authentication Through 3D Structural Analysis
Sort
View
EOR
2006
117views more  EOR 2006»
13 years 8 months ago
Heuristics for selecting robust database structures with dynamic query patterns
The success of a company increasingly depends on timely information (internal or external) being available to the right person at the right time for crucial managerial decision-ma...
Andrew N. K. Chen, Paulo B. Goes, Alok Gupta, Jame...
VRST
2010
ACM
13 years 6 months ago
Region-of-interest volumetric visual hull refinement
This paper introduces a region-of-interest visual hull refinement technique, based on flexible voxel grids for volumetric visual hull reconstructions. Region-of-interest refinemen...
Daniel Knoblauch, Falko Kuester
ICWSM
2009
13 years 6 months ago
Gephi: An Open Source Software for Exploring and Manipulating Networks
Gephi is an open source software for graph and network analysis. It uses a 3D render engine to display large networks in real-time and to speed up the exploration. A flexible and ...
Mathieu Bastian, Sebastien Heymann, Mathieu Jacomy
TCSV
2008
174views more  TCSV 2008»
13 years 8 months ago
A Survey of Vision-Based Trajectory Learning and Analysis for Surveillance
Abstract--This paper presents a survey of trajectory-based activity analysis for visual surveillance. It describes techniques that use trajectory data to define a general set of ac...
Brendan Tran Morris, Mohan M. Trivedi
HICSS
2003
IEEE
165views Biometrics» more  HICSS 2003»
14 years 1 months ago
Analysis of the Effectiveness of Global Virtual Teams in Software Engineering Projects
Global software development projects use virtual teams, which are primarily linked through computer and telecommunications technologies across national boundaries. Global Virtual ...
H. Keith Edwards, Varadharajan Sridhar