Sciweavers

576 search results - page 93 / 116
» Realtime Personal Positioning System for Wearable Computers
Sort
View
WEBI
2009
Springer
14 years 2 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
ISVC
2005
Springer
14 years 1 months ago
Rendering Optimizations Guided by Head-Pose Estimates and Their Uncertainty
In virtual environments, head pose and/or eye-gaze estimation can be employed to improve the visual experience of the user by enabling adaptive level of detail during rendering. In...
Javier E. Martínez, Ali Erol, George Bebis,...
GECCO
2009
Springer
138views Optimization» more  GECCO 2009»
14 years 2 months ago
IMAD: in-execution malware analysis and detection
The sophistication of computer malware is becoming a serious threat to the information technology infrastructure, which is the backbone of modern e-commerce systems. We, therefore...
Syed Bilal Mehdi, Ajay Kumar Tanwani, Muddassar Fa...
ACMACE
2006
ACM
14 years 1 months ago
Interaction techniques for musical performance with tabletop tangible interfaces
We present a set of interaction techniques for electronic musical performance using a tabletop tangible interface. Our system, the Audiopad, tracks the positions of objects on a t...
James Patten, Ben Recht, Hiroshi Ishii
ICPR
2008
IEEE
14 years 2 months ago
An improved mean-shift tracker with kernel prediction and scale optimisation targeting for low-frame-rate video tracking
The mean-shift (MS) algorithm is widely used in object tracking because of its speed and simplicity. However, it assumes certain overlap of object appearance and smooth change in ...
Zhidong Li, Jing Chen, Nicol N. Schraudolph