Sciweavers

2421 search results - page 48 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
COLING
1996
14 years 10 days ago
Prepositional Phrase Attachment Through A Hybrid Disambiguation Model
Prepositional phrase attachment is a major cause of stru(:tural alnbiguity in natural language. Recent work has been dependent on corpus-based approaches to deal with this problem...
Haodong Wu, Teiji Furugori
ICPR
2000
IEEE
15 years 2 days ago
Using Temporal Integration for Tracking Regions in Traffic Monitoring Sequences
This paper1 describes a method for tracking regions in image sequences. Regions segmented from each frame by a motion segmentation technique are matched by using a relaxation proc...
Filiberto Pla, Jorge Badenas, José M. Sanch...
PAMI
2010
168views more  PAMI 2010»
13 years 9 months ago
Surface-from-Gradients without Discrete Integrability Enforcement: A Gaussian Kernel Approach
—Representative surface reconstruction algorithms taking a gradient field as input enforces the integrability constraint in a discrete manner. While enforcing integrability allo...
Heung-Sun Ng, Tai-Pang Wu, Chi-Keung Tang
GECCO
2004
Springer
142views Optimization» more  GECCO 2004»
14 years 4 months ago
Evolutionary Computation Techniques for Optimizing Fuzzy Cognitive Maps in Radiation Therapy Systems
Abstract. The optimization of a Fuzzy Cognitive Map model for the supervision and monitoring of the radiotherapy process is proposed. This is performed through the minimization of ...
Konstantinos E. Parsopoulos, Elpiniki Papageorgiou...
ACSAC
2006
IEEE
14 years 5 months ago
PAST: Probabilistic Authentication of Sensor Timestamps
Sensor networks are deployed to monitor the physical environment in public and vulnerable locations. It is not economically viable to house sensors in tamper-resilient enclosures ...
Ashish Gehani, Surendar Chandra