Eyes Detection Combined Feature Extraction and Mouth Information (Englisch)
- Neue Suche nach: Huang, H.-Y.
- Neue Suche nach: Lin, Y.-C.
- Neue Suche nach: Huang, H.-Y.
- Neue Suche nach: Lin, Y.-C.
- Neue Suche nach: Gelenbe, Erol
- Neue Suche nach: Lent, Ricardo
In:
Computer and information sciences; Information sciences and systems 2013: proceedings of the 28th international symposium on computer and information sciences /
;
179-188
;
2013
-
ISBN:
-
ISSN:
- Aufsatz (Konferenz) / Print
-
Titel:Eyes Detection Combined Feature Extraction and Mouth Information
-
Beteiligte:
-
Kongress:International symposium; 28th, Computer and information sciences; Information sciences and systems 2013: proceedings of the 28th international symposium on computer and information sciences / ; 2013 ; Paris
-
Erschienen in:LECTURE NOTES IN ELECTRICAL ENGINEERING ; 264 ; 179-188
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:Cham
-
Erscheinungsdatum:01.01.2013
-
Format / Umfang:10 pages
-
Anmerkungen:Also known as ISCIS 2013. Includes bibliographical references and index. Also issued online.
-
ISBN:
-
ISSN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 3
-
Adaptive Curve TailoringSteihaug, T. / Wang, W. et al. | 2013
- 15
-
Regularizing Soft Decision TreesYildiz, O.T. / Alpaydin, E. et al. | 2013
- 23
-
A Simple Yet Fast Algorithm for the Closest-Pair Problem Using Sorted Projections on Multi-DimensionsDalkilic, M.E. / Ergun, S. et al. | 2013
- 35
-
DARWIN: A Genetic Algorithm LanguageArslan, A. / Ucoluk, G. et al. | 2013
- 45
-
Distributed Selfish Algorithms for the Max-Cut GameAuger, D. / Cohen, J. / Coucheney, P. / Rodier, L. et al. | 2013
- 57
-
Distributed Binary Consensus in Dynamic NetworksBabaee, A. / Draief, M. et al. | 2013
- 67
-
Computing Bounds of the MTTF for a Set of Markov ChainsAit-Salaht, F. / Fourneau, J.M. / Pekergin, N. et al. | 2013
- 77
-
Analysing and Predicting Patient Arrival TimesChis, T. / Harrison, P.G. et al. | 2013
- 87
-
Optimal Behaviour of Smart Wireless UsersOklander, B. / Gelenbe, E. et al. | 2013
- 97
-
Hyper-Heuristics for Performance Optimization of Simultaneous Multithreaded ProcessorsGuney, I.A. / Kucuk, G. / Ozcan, E. et al. | 2013
- 107
-
A Model of Speculative Parallel Scheduling in Networks of Unreliable SensorsQiu, Z. / Harrison, P.G. et al. | 2013
- 117
-
Energy-Aware Admission Control for Wired NetworksMorfopoulou, C. / Sakellari, G. / Gelenbe, E. et al. | 2013
- 129
-
Named Entity Recognition in Turkish with Bayesian Learning and Hybrid ApproachesYavuz, S.R. / Kucuk, D. / Yazici, A. et al. | 2013
- 139
-
Transfer Learning Using Twitter Data for Improving Sentiment Classification of Turkish Political NewsKaya, M. / Fidan, G. / Toroslu, I.H. et al. | 2013
- 149
-
A Fully Semantic Approach to Large Scale Text CategorizationDessi, N. / Dessi, S. / Pes, B. et al. | 2013
- 159
-
Emotion Analysis on Turkish TextsBoynukalin, Z. / Karagoz, P. et al. | 2013
- 169
-
A Comparative Study to Determine the Effective Window Size of Turkish Word Sense Disambiguation SystemsIlgen, B. / Adali, E. / Tantug, A.C. et al. | 2013
- 179
-
Eyes Detection Combined Feature Extraction and Mouth InformationHuang, H.-Y. / Lin, Y.-C. et al. | 2013
- 189
-
Depth from Moving AperturesSayar, M.S. / Akgul, Y.S. et al. | 2013
- 199
-
Score Level Fusion for Face-Iris Multimodal Biometric SystemEskandari, M. / Toygar, O. et al. | 2013
- 209
-
Feature Selection for Enhanced 3D Facial Expression Recognition Based on Varying Feature Point DistancesYurtkan, K. / Soyel, H. / Demirel, H. et al. | 2013
- 221
-
DAPNA: An Architectural Framework for Data Processing NetworksSozer, H. / Nouta, S. / Wombacher, A. / Perona, P. et al. | 2013
- 231
-
Crescent: A Byzantine Fault Tolerant Delivery Framework for Durable Composite Web ServicesElgedawy, I. et al. | 2013
- 241
-
Morphological Document Recovery in HSI SpaceSgarbi, E.M. / Mura, W.A.D. / Moya, N. / Facon, J. et al. | 2013
- 251
-
Ontological Approach to Data Warehouse Source IntegrationDi Tria, F. / Lefons, E. / Tangorra, F. et al. | 2013
- 261
-
Adaptive Oversampling for Imbalanced Data ClassificationErtekin, S. et al. | 2013
- 273
-
Energy-Aware Distributed Hash Table-Based Bootstrapping Protocol for Randomly Deployed Heterogeneous Wireless Sensor NetworksFersi, G. / Louati, W. / Jemaa, M.B. et al. | 2013
- 285
-
Sensor-Activity Relevance in Human Activity Recognition with Wearable Motion Sensors and Mutual Information CriterionDobrucali, O. / Barshan, B. et al. | 2013
- 295
-
Routing Emergency Evacuees with Cognitive Packet NetworksBi, H. / Desmet, A. / Gelenbe, E. et al. | 2013
- 305
-
Detection and Evaluation of Physical Therapy Exercises by Dynamic Time Warping Using Wearable Motion Sensor UnitsYurtman, A. / Barshan, B. et al. | 2013
- 317
-
Commutative Matrix-Based Diffie-Hellman-Like Key-Exchange ProtocolChefranov, A.G. / Mahmoud, A.Y. et al. | 2013
- 325
-
Anonymity in Multi-Instance Micro-Data PublicationAbul, O. et al. | 2013
- 339
-
Homomorphic Minimum Bandwidth Repairing CodesHaytaoglu, E. / Dalkilic, M.E. et al. | 2013
- 349
-
Recreating a Large-Scale BGP Incident in a Realistic EnvironmentKaraarslan, E. / Perez, A.G. / Siaterlis, C. et al. | 2013
- 359
-
Uneven Key Pre-Distribution Scheme for Multi-Phase Wireless Sensor NetworksCatakoglu, O. / Levi, A. et al. | 2013
- 369
-
NEMESYS: Enhanced Network Security for Seamless Service Provisioning in the Smart Mobile EcosystemGelenbe, E. / Gorbil, G. / Tzovaras, D. / Liebergeld, S. / Garcia, D. / Baltatu, M. / Lyberopoulos, G. et al. | 2013
- 379
-
Towards Visualizing Mobile Network DataPapadopoulos, S. / Tzovaras, D. et al. | 2013
- 389
-
Infrastructure for Detecting Android MalwareDelosieres, L. / Garcia, D. et al. | 2013
- 399
-
NEMESYS: First Year Project Experience in Telecom Italia Information TechnologyBaltatu, M. / D Alessandro, R. / D Amico, R. et al. | 2013
- 409
-
Android Security, Pitfalls and Lessons LearnedLiebergeld, S. / Lange, M. et al. | 2013
- 419
-
Mobile Network Threat Analysis and MNO PositioningLyberopoulos, G. / Theodoropoulou, H. / Filis, K. et al. | 2013
- 429
-
Mobile Network Anomaly Detection and Mitigation: The NEMESYS ApproachAbdelrahman, O.H. / Gelenbe, E. / Gorbil, G. / Oklander, B. et al. | 2013