Ara
Toplam kayıt 89, listelenen: 1-10
Semi-automatic adaptation of high-polygon wireframe face models through inverse perspective projection
(Springer-Verlag, 2012)
Precise registration of a generic 3D face model with a subject's face is a critical stage for model based analysis of facial expressions. In this study we propose a semi-automatic model fitting algorithm to fit a high-polygon ...
Crossing minimization in weighted bipartite graphs
(Springer, 2007)
Given a bipartite graph G = (L-0, L-1, E) and a fixed ordering of the nodes in L-0, the problem of finding an ordering of the nodes in L-1 that minimizes the number of crossings has received much attention in literature. ...
A priority based packet scheduler with deadline considerations
(IEEE Computer Soc, 2006)
QoS issues have become a focal point of research on Next Generation Networks (NGNs). In order to supply the various QoS requirement for different kinds of applications, new scheduling policies need to be developed and ...
The modified proactive feedback based flow control scheme for best-effort applications
(International Institute of Informatics and Systemics (IIIS), 2007)
High speed networks that are characterized by large bandwidth propagation delay products are expected to support applications with diverse traffic characteristics and Quality of Service (QoS) requirements. Thus, flow control ...
Error propagation through generalized high dimensional model representation for data partitioning
(Wiley-V C H Verlag GMBH, 2004)
In many circumstances the explicit form of a multivariate function is not known; rather a finite number of data is listed from some physical experiments. In such cases a function can be constructed only by imposing some ...
Adaptive visual obstacle detection for mobile robots using monocular camera and ultrasonic sensor
(Springer-Verlag, 2012-10-07)
This paper presents a novel vision based obstacle detection algorithm that is adapted from a powerful background subtraction algorithm: ViBe (VIsual Background Extractor). We describe an adaptive obstacle detection method ...
Cryptanalysis of image encryption with compound chaotic sequence
(IEEE, 2009)
Recently, an image encryption algorithm based on compound chaotic sequence was proposed [Tong et al., Image and Vision Computing 26 (2008) 843]. In this paper, we analyze the security weaknesses of the proposal. We give ...
A robust biclustering method based on crossing minimization in bipartite graphs
(Springer-Verlag Berlin, 2009)
[No abstract available]
Driver recognition using gaussian mixture models and decision fusion techniques
(Springer-Verlag Berlin, 2008)
In this paper we present our research in driver recognition. The goal of this study is to investigate the performance of different classifier fusion techniques in a driver recognition scenario. We are using solely driving ...
Budding trees
(IEEE Computer Soc, 2014-08-24)
We propose a new decision tree model, named the budding tree, where a node can be both a leaf and an internal decision node. Each bud node starts as a leaf node, can then grow children, but then later on, if necessary, its ...