Sciweavers

3359 search results - page 492 / 672
» A Simplified Idea Algorithm
Sort
View
FDTC
2010
Springer
132views Cryptology» more  FDTC 2010»
13 years 8 months ago
Fault Injection Resilience
Fault injections constitute a major threat to the security of embedded systems. The errors in the cryptographic algorithms have been shown to be extremely dangerous, since powerful...
Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger,...
KDD
2012
ACM
190views Data Mining» more  KDD 2012»
12 years 1 months ago
Multi-label hypothesis reuse
Multi-label learning arises in many real-world tasks where an object is naturally associated with multiple concepts. It is well-accepted that, in order to achieve a good performan...
Sheng-Jun Huang, Yang Yu, Zhi-Hua Zhou
CVPR
2003
IEEE
15 years 20 days ago
PAMPAS: Real-Valued Graphical Models for Computer Vision
Probabilistic models have been adopted for many computer vision applications, however inference in highdimensional spaces remains problematic. As the statespace of a model grows, ...
Michael Isard
CVPR
2008
IEEE
15 years 20 days ago
Precise detailed detection of faces and facial features
Face detection has advanced dramatically over the past three decades. Algorithms can now quite reliably detect faces in clutter in or near real time. However, much still needs to ...
Liya Ding, Aleix M. Martínez
ECCV
2002
Springer
15 years 15 days ago
Multi-scale EM-ICP: A Fast and Robust Approach for Surface Registration
We investigate in this article the rigid registration of large sets of points, generally sampled from surfaces. We formulate this problem as a general Maximum-Likelihood (ML) estim...
Sébastien Granger, Xavier Pennec