Sciweavers

2399 search results - page 333 / 480
» On Authentication between Human and Computer
Sort
View
CVPR
2009
IEEE
14 years 6 days ago
Classification of tensors and fiber tracts using Mercer-kernels encoding soft probabilistic spatial and diffusion information
In this paper, we present a kernel-based approach to the clustering of diffusion tensors and fiber tracts. We propose to use a Mercer kernel over the tensor space where both spati...
Radhouène Neji, Nikos Paragios, Gilles Fleu...
BMVC
2002
13 years 10 months ago
Low Density Feature Point Matching for Articulated Pose Identification
We describe a general algorithm for identifying an arbitrary pose of an articulated subject with low density feature points. The algorithm aims to establish a one-to-one correspon...
Horst Holstein, Baihua Li
AIIDE
2006
13 years 9 months ago
Normative Echoes: Use and Manipulation of Player Generated Content by Communities of NPCs
Normative Echoes is an interactive installation that explores ways to combine player-created content with procedural content. Animated autonomous agents inhabit virtual islands on...
Eric Baumer, Bill Tomlinson, Man Lok Yau, Thomas A...
GI
2008
Springer
13 years 9 months ago
Menu Structuring for Mobile Devices
: This project sets a discussion about possible improvements for mobile menu structuring. Navigation on mobile phones is supposed to get quicker and easier. To reach for better use...
Katrin Sauerwein, Nathalie Prevost, Alexander De L...
CVPR
2008
IEEE
13 years 8 months ago
Hallucinating 3D facial shapes
This paper focuses on hallucinating a facial shape from a low-resolution 3D facial shape. Firstly, we give a constrained conformal embedding of 3D shape in R2 , which establishes ...
Gang Pan, Song Han, Zhaohui Wu