Sciweavers

5398 search results - page 989 / 1080
» Markov Face Models
Sort
View
IJFCS
2006
119views more  IJFCS 2006»
13 years 7 months ago
Enforcing Concurrent Temporal Behaviors
The outcome of verifying software is often a `counterexample', i.e., a listing of the actions and states of a behavior not satisfying the specification. In order to understan...
Doron Peled, Hongyang Qu
IJISTA
2006
113views more  IJISTA 2006»
13 years 7 months ago
Extraction of mid-level semantics from gesture videos using a Bayesian network
In this paper a method for extraction of mid-level semantics from sign language videos is proposed, by employing high level domain knowledge. The semantics concern labeling of the ...
Dimitrios I. Kosmopoulos, Ilias Maglogiannis
JCM
2008
86views more  JCM 2008»
13 years 7 months ago
IPv6 over IEEE 802.16 (WiMAX) Networks: Facts and Challenges
Deploying the new generation "Internet Protocol" (IPv6) over 802.16-based wireless networks is facing an important challenge as the IEEE 802.16 standard is failing to sup...
Adlen Ksentini
JMM2
2008
84views more  JMM2 2008»
13 years 7 months ago
A Localized and Secure Method for Transferring Bank Information by SMS for Persian Banks
Nowadays m-banking (mobile banking) is widely used in many banks. It has embarked upon supply of various services based on different systems and with the aid of various services su...
Mohammad Hassan Shirali-Shahreza, Mohammad Shirali...
JSW
2008
95views more  JSW 2008»
13 years 7 months ago
From Sensors to Assisted Driving - Bridging the Gap
Increasing traffic density enforces development of Advanced Driver Assistance Systems to cope with safety aspects. Such systems require serious amount of sensor data to deduce spat...
Marcus Tönnis, Jan-Gregor Fischer, Gudrun Kli...