Sciweavers

1617 search results - page 308 / 324
» On the Performance and Use of Speaker Recognition Systems fo...
Sort
View
IJVR
2007
128views more  IJVR 2007»
13 years 8 months ago
Occlusion Management in Immersive and Desktop 3D Virtual Environments: Theory and Evaluation
—We present an empirical usability experiment studying the relative strengths and weaknesses of three different occlusion management techniques for discovering and accessing obje...
Niklas Elmqvist, Mihail Eduard Tudoreanu
AIPR
2006
IEEE
14 years 2 months ago
Recovering Spheres from 3D Point Data
The National Institute of Standards and Technology is involved in developing standard protocols for the performance evaluation of 3D imaging systems, which include laser scanners ...
Christoph Witzgall, Geraldine S. Cheok, Anthony J....
MSWIM
2006
ACM
14 years 2 months ago
Analysis of soft handover measurements in 3G network
A neural network based clustering method for the analysis of soft handovers in 3G network is introduced. The method is highly visual and it could be utilized in explorative analys...
Kimmo Raivio
MIR
2005
ACM
133views Multimedia» more  MIR 2005»
14 years 2 months ago
Probabilistic web image gathering
We propose a new method for automated large scale gathering of Web images relevant to specified concepts. Our main goal is to build a knowledge base associated with as many conce...
Keiji Yanai, Kobus Barnard
GECCO
2005
Springer
126views Optimization» more  GECCO 2005»
14 years 2 months ago
Is negative selection appropriate for anomaly detection?
Negative selection algorithms for hamming and real-valued shape-spaces are reviewed. Problems are identified with the use of these shape-spaces, and the negative selection algori...
Thomas Stibor, Philipp H. Mohr, Jonathan Timmis, C...