Sciweavers

304 search results - page 48 / 61
» Verification of Timed Systems Using POSETs
Sort
View
ICIP
2002
IEEE
14 years 10 months ago
Polynomial features for robust face authentication
In this paper we introduce the DCT-mod2 facial feature extraction technique which utilizes polynomial coefficients derived from 2-D DCT coefficients of spatially neighbouring bloc...
Conrad Sanderson, Kuldip K. Paliwal
JSW
2007
126views more  JSW 2007»
13 years 9 months ago
Supporting UML Sequence Diagrams with a Processor Net Approach
— UML sequence diagrams focus on the interaction between different classes. For distributed real time transaction processing it is possible to end up with complex sequence diagra...
Tony Spiteri Staines
ACMICEC
2007
ACM
154views ECommerce» more  ACMICEC 2007»
14 years 1 months ago
Learning and adaptivity in interactive recommender systems
Recommender systems are intelligent E-commerce applications that assist users in a decision-making process by offering personalized product recommendations during an interaction s...
Tariq Mahmood, Francesco Ricci
ATAL
2009
Springer
14 years 3 months ago
Graph-based methods for the analysis of large-scale multiagent systems
Multiagent systems are often characterized by complex, and sometimes unpredictable interactions amongst their autonomous components. While these systems can provide robust and sca...
Wilbur Peng, William Krueger, Alexander Grushin, P...
DIAL
2004
IEEE
181views Image Analysis» more  DIAL 2004»
14 years 24 days ago
Forensic Handwritten Document Retrieval System
Document storage and retrieval capabilities of the CEDAR-FOX forensic handwritten document examination system are described. The system is designed for automated and semi-automate...
Sargur N. Srihari, Zhixin Shi