Sciweavers

125 search results - page 16 / 25
» A fast and robust exact algorithm for face embedding
Sort
View
ICMCS
1999
IEEE
165views Multimedia» more  ICMCS 1999»
13 years 11 months ago
Template Based Recovery of Fourier-Based Watermarks Using Log-Polar and Log-Log Maps
Digital watermarks have been proposed as a method for discouraging illicit copying and distribution of copyrighted material. This paper describes a method for the secure and robus...
Shelby Pereira, Joseph Ó Ruanaidh, Fr&eacut...
JMLR
2006
125views more  JMLR 2006»
13 years 7 months ago
Spam Filtering Using Statistical Data Compression Models
Spam filtering poses a special problem in text categorization, of which the defining characteristic is that filters face an active adversary, which constantly attempts to evade fi...
Andrej Bratko, Gordon V. Cormack, Bogdan Filipic, ...
CEC
2007
IEEE
14 years 1 months ago
Memetic algorithms for inexact graph matching
—The noise-robust matching of two graphs is a hard combinatorial problem with practical importance in several domains. In practical applications, a unique solution for a given in...
Thomas Bärecke, Marcin Detyniecki
COMPGEOM
2009
ACM
14 years 2 months ago
Incremental construction of the delaunay triangulation and the delaunay graph in medium dimension
We describe a new implementation of the well-known incremental algorithm for constructing Delaunay triangulations in any dimension. Our implementation follows the exact computing ...
Jean-Daniel Boissonnat, Olivier Devillers, Samuel ...
INFORMATICALT
2010
145views more  INFORMATICALT 2010»
13 years 4 months ago
GSM Speech Coder Indirect Identification Algorithm
This paper presents GSM speech coder indirect identification algorithm based on sending novel identification pilot signals through the GSM speech channel. Each GSM subsystem distur...
Rajko Svecko, Bojan Kotnik, Amor Chowdhury, Zdenko...