Sciweavers

2784 search results - page 433 / 557
» Relation Extraction with Relation Topics
Sort
View
WIAMIS
2009
IEEE
14 years 4 months ago
Adaptive gesture recognition in Human Computer Interaction
An adaptive, invariant to user performance fluctuation or noisy input signal, gesture recognition scheme is presented based on Self Organizing Maps, Markov Models and Levenshtein...
George Caridakis, Kostas Karpouzis, Athanasios I. ...
INFOCOM
2009
IEEE
14 years 4 months ago
Tracking with Unreliable Node Sequences
—Tracking mobile targets using sensor networks is a challenging task because of the impacts of in-the-filed factors such as environment noise, sensing irregularity and etc. This...
Ziguo Zhong, Ting Zhu, Dan Wang, Tian He
IROS
2009
IEEE
164views Robotics» more  IROS 2009»
14 years 4 months ago
Visual steering of UAV in unknown environments
— In this paper, we propose a novel approach for the visual navigation of unmanned aerial vehicles (UAV). In contrast to most available methods, a single perspective camera is us...
Chunrong Yuan, Fabian Recktenwald, Hanspeter A. Ma...
ADC
2009
Springer
175views Database» more  ADC 2009»
14 years 4 months ago
Conditional Purpose Based Access Control Model for Privacy Protection
This paper presents a model for privacy preserving access control which is based on variety of purposes. Conditional purpose is applied along with allowed purpose and prohibited p...
Md. Enamul Kabir, Hua Wang
WEBI
2009
Springer
14 years 4 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham