نتایج جستجو برای: and publically available officialdocuments

تعداد نتایج: 16842888  

2009

Latency’s effect on performance in online games is becoming an increasingly relevant area of research. While much research has been performed on the broad topic of latency in games, this project studied the effect of latency on game actions based on their precision and deadline characteristics. We modified a publically available game to allow for artificially induced latency, ran experiments in...

2004
Kieron Messer Josef Kittler Mohammad Sadeghi Miroslav Hamouz Alexey Kostin Sébastien Marcel Samy Bengio Fabien Cardinaux Conrad Sanderson Norman Poh Yann Rodriguez Krzysztof Kryszczuk Jacek Czyz Luc Vandendorpe Johnny Ng Humphrey Cheung Billy Tang

This paper details the results of a face verification competition [2] held in conjunction with the First International Conference on Biometric Authentication. The contest was held on the publically available BANCA database [1] according to a defined protocol [6]. Six different verification algorithms from 4 academic and commercial institutions submitted results. Also, a standard set of face rec...

2004
Allan Hanbury Jocelyn Marchadier Walter G. Kropatsch

Irregular pyramids organise several topological partitions which can be deduced from a partition (called the base of the pyramid) by successive unions of regions. In this paper, we introduce the redundancy pyramid structure. This structure accounts for redundant topological structures present in several topological partitions. We apply it to the problem of segmentation fusion, where we show tha...

2009
Ajay Kumar Yingbo Zhou

Electronics Letters vol. 45, no. 20, September 2009 Personal Identification using Finger Knuckle Orientation Features Ajay Kumar, Yingbo Zhou This paper proposes a novel approach for personal identification using finger images which exploits the orientation features from the random knuckle lines using finite Radon transform. The feasibility of this approach is rigorously evaluated on a publical...

2013
Neta S. Zuckerman Yair Noam Andrea J. Goldsmith Peter P. Lee

Gene expression analysis is generally performed on heterogeneous tissue samples consisting of multiple cell types. Current methods developed to separate heterogeneous gene expression rely on prior knowledge of the cell-type composition and/or signatures--these are not available in most public datasets. We present a novel method to identify the cell-type composition, signatures and proportions p...

2013
Farha Bilal Motiwala Kim Stasia Siscoe Rif S El-Mallakh

Improving outcomes in schizophrenia generally requires an improvement in medication adherence. One of the most effective interventions to improve adherence is the use of depot formulations of antipsychotic medications. A new depot aripiprazole formulation for the treatment of schizophrenia will be available soon. A review of all publically available information on depot aripiprazole as of Novem...

2007
FRANZ GÄHLER

Algorithms are presented for the computation with crystallographic groups of arbitrary dimension, in particular for the determination of the Wyckoff positions and maximal subgroups of a space group, and for the determination of all space group types for a given point group. These algorithms have been implemented in the computer algebra system GAP, and are made publically available. The capabili...

2006
Alisher Kholmatov Berrin Yanikoglu

Online signature verification is a challenging problem. It’s difficulty comes from the problem of separation between genuine variation of an individual’s signatures and that of forgery signatures. Different algorithms have been proposed by various researchers, however lack of the publically available signature databases hinders benchmarking their performances. In this paper we introduce a signa...

2001
L. Qin B. Kamousi B. He

We have developed new algorithms for classification of motor imagery tasks for Brain-Computer Interface applications by analyzing single trial scalp EEG signals in the time-, frequency-, and spacedomains. These new algorithms have been evaluated using a publically available dataset. The results are promising, suggesting that the newly developed algorithms may provide useful alternative for noni...

2002
Eric Roman

In this paper we evaluate candidates for a checkpoint/restart implementation against a common set of requirements. Overall characteristics of the two main classes of checkpoint systems, library and system, are discussed followed by specific examples from existing systems. A detailed description of two system implementations is presented. We conclude that no single publically available implement...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید