Sciweavers

2576 search results - page 510 / 516
» Methodology work is ontology work
Sort
View
ACMACE
2009
ACM
13 years 6 months ago
Facial caricature generation using a quadratic deformation model
In this paper we propose a novel approach for generating expressive caricatures from an input image. The novelty of this work comes from combining an Active Appearance Model facia...
Mohammad Obaid, D. Lond, Ramakrishnan Mukundan, Ma...
HRI
2009
ACM
13 years 6 months ago
Evaluating the ICRA 2008 HRI challenge
This paper reports on the evaluation of the ICRA 2008 Human-Robot Interaction (HRI) Challenge. Five research groups demonstrated state-of-the-art work on HRI with a special focus ...
Astrid Weiss, Thomas Scherndl, Manfred Tscheligi, ...
ICC
2009
IEEE
152views Communications» more  ICC 2009»
13 years 6 months ago
System Spectral Efficiency and Stability of 3G Networks: A Comparative Study
CDMA2000, WCDMA and WiMAX are three widely used 3G technologies. Since they share the same goal, which is to provide broader coverage and higher throughput in 3G networks, an impar...
Yuehong Gao, Xin Zhang, Yuming Jiang, Jeong-woo Ch...
BMCBI
2010
140views more  BMCBI 2010»
13 years 6 months ago
An improved machine learning protocol for the identification of correct Sequest search results
Background: Mass spectrometry has become a standard method by which the proteomic profile of cell or tissue samples is characterized. To fully take advantage of tandem mass spectr...
Morten Kallberg, Hui Lu
CORR
2010
Springer
155views Education» more  CORR 2010»
13 years 6 months ago
A Proof Theoretic Analysis of Intruder Theories
We consider the problem of intruder deduction in security protocol analysis: that is, deciding whether a given message M can be deduced from a set of messages under the theory of ...
Alwen Tiu, Rajeev Goré, Jeremy E. Dawson