Sciweavers

698 search results - page 106 / 140
» Evaluating Key Statements Analysis
Sort
View
AMDO
2008
Springer
13 years 12 months ago
A Comparative Study on Using Zernike Velocity Moments and Hidden Markov Models for Hand Gesture Recognition
Hand-gesture recognition presents a challenging problem for computer vision due to the articulated structure of the human hand and the complexity of the environments in which it is...
Moaath Al-Rajab, David Hogg, Kia Ng
CIKM
2008
Springer
13 years 12 months ago
REDUS: finding reducible subspaces in high dimensional data
Finding latent patterns in high dimensional data is an important research problem with numerous applications. The most well known approaches for high dimensional data analysis are...
Xiang Zhang, Feng Pan, Wei Wang 0010
EUROPAR
2008
Springer
13 years 11 months ago
Transparent Mobile Middleware Integration for Java and .NET Development Environments
Developing a distributed application for mobile resource constrained devices is a difficult and error-prone task that requires awareness of several system-level details (e.g., faul...
Edgar Marques, Luís Veiga, Paulo Ferreira
EON
2008
13 years 11 months ago
Semantic Web Service Discovery and Selection: a Test Bed Scenario
Abstract. The Semantic Web Service Challenge is one of the major initiative dedicated to work on Semantic Web Service (SWS) discovery and selection. It represents an effective mann...
Alessio Carenini, Dario Cerizza, Marco Comerio, Em...
ICONIP
2008
13 years 11 months ago
Detecting Methods of Virus Email Based on Mail Header and Encoding Anomaly
In this paper, we try to develop a machine learning-based virus email detection method. The key feature of this paper is employing Mail Header and Encoding Anomaly(MHEA) [1]. MHEA ...
Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobaya...