Sciweavers

2015 search results - page 113 / 403
» Hidden Software Capabilities
Sort
View
VMV
2003
181views Visualization» more  VMV 2003»
13 years 10 months ago
2.5D Active Contour for Surface Reconstruction
In this paper, we present a new deformable model — 2.5D Active Contour— that is capable of directly extracting shape geometry from 3D unorganized point cloud datasets. The rec...
Ye Duan, Hong Qin
CSL
2010
Springer
13 years 9 months ago
Speech segmentation using regression fusion of boundary predictions
In the present work we study the appropriateness of a number of linear and non-linear regression methods, employed on the task of speech segmentation, for combining multiple phone...
Iosif Mporas, Todor Ganchev, Nikos Fakotakis
ISI
2006
Springer
13 years 9 months ago
Analyzing the Terrorist Social Networks with Visualization Tools
Analysis of terrorist social networks is essential for discovering knowledge about the structure of terrorist organizations. Such knowledge is important for developing effective co...
Christopher C. Yang, Nan Liu, Marc Sageman
ML
2006
ACM
113views Machine Learning» more  ML 2006»
13 years 9 months ago
Learning to bid in bridge
Bridge bidding is considered to be one of the most difficult problems for game-playing programs. It involves four agents rather than two, including a cooperative agent. In additio...
Asaf Amit, Shaul Markovitch
ML
2006
ACM
13 years 9 months ago
XRules: An effective algorithm for structural classification of XML data
Abstract XML documents have recently become ubiquitous because of their varied applicability in a number of applications. Classification is an important problem in the data mining ...
Mohammed Javeed Zaki, Charu C. Aggarwal