Sciweavers

737 search results - page 143 / 148
» Generative approaches for application tailoring of mobile de...
Sort
View
ICB
2007
Springer
156views Biometrics» more  ICB 2007»
14 years 2 months ago
Robust Extraction of Secret Bits from Minutiae
Abstract. Our goal is to extract consistent bits from the same fingerprint in a noisy environment. Such bits can then be used as a secret key in several cryptographic applications...
Ee-Chien Chang, Sujoy Roy
ICTAI
2006
IEEE
14 years 1 months ago
On the Relationships between Clustering and Spatial Co-location Pattern Mining
The goal of spatial co-location pattern mining is to find subsets of spatial features frequently located together in spatial proximity. Example co-location patterns include servi...
Yan Huang, Pusheng Zhang
AAAI
2007
13 years 10 months ago
Adaptive Localization in a Dynamic WiFi Environment through Multi-view Learning
Accurately locating users in a wireless environment is an important task for many pervasive computing and AI applications, such as activity recognition. In a WiFi environment, a m...
Sinno Jialin Pan, James T. Kwok, Qiang Yang, Jeffr...
RAS
2008
135views more  RAS 2008»
13 years 7 months ago
Constructing dependable certainty grids from unreliable sensor data
-- Measurements from sensors as they are used for robotic grid map applications typically show behavior like degradation or discalibration over time, which affects the quality of t...
Wilfried Elmenreich
CVPR
2008
IEEE
14 years 10 months ago
Sketching in the air: A vision-based system for 3D object design
3D object design has many applications including flexible 3D sketch input in CAD, computer game, webpage content design, image based object modeling, and 3D object retrieval. Most...
Yu Chen, Jianzhuang Liu, Xiaoou Tang