Sciweavers

2825 search results - page 388 / 565
» Robust Feature Selection Algorithms
Sort
View
CIVR
2007
Springer
149views Image Analysis» more  CIVR 2007»
14 years 3 months ago
Video copy detection: a comparative study
This paper presents a comparative study of methods for video copy detection. Different state-of-the-art techniques, using various kinds of descriptors and voting functions, are d...
Julien Law-To, Li Chen, Alexis Joly, Ivan Laptev, ...
RTSS
2005
IEEE
14 years 3 months ago
Decentralized Utilization Control in Distributed Real-Time Systems
Many real-time systems must control their CPU utilizations in order to meet end-to-end deadlines and prevent overload. Utilization control is particularly challenging in distribut...
Xiaorui Wang, Dong Jia, Chenyang Lu, Xenofon D. Ko...
ATAL
2008
Springer
13 years 11 months ago
Role-based teamwork activity recognition in observations of embodied agent actions
Recognizing team actions in the behavior of embodied agents has many practical applications and had seen significant progress in recent years. One approach with proven results is ...
Linus J. Luotsinen, Ladislau Bölöni
GRAPHICSINTERFACE
2007
13 years 11 months ago
Spectral graph-theoretic approach to 3D mesh watermarking
We propose a robust and imperceptible spectral watermarking method for high rate embedding of a watermark into 3D polygonal meshes. Our approach consists of four main steps: (1) t...
Emad E. Abdallah, A. Ben Hamza, Prabir Bhattachary...
BIOSIG
2003
145views Biometrics» more  BIOSIG 2003»
13 years 11 months ago
Pass Phrase Based Speaker Recognition for Authentication
: Speaker recognition in applications of our daily lives is not yet in widespread use. In order for biometric technology to make sense for real-world authentication applications an...
Heinz Hertlein, Robert Frischholz, Elmar Nöth