Sciweavers

189 search results - page 21 / 38
» An optimal generalization of the centerpoint theorem, and it...
Sort
View
CVPR
2008
IEEE
14 years 10 months ago
Misalignment-robust face recognition
In this paper, we study the problem of subspace-based face recognition under scenarios with spatial misalignments and/or image occlusions. For a given subspace, the embedding of a...
Huan Wang, Shuicheng Yan, Thomas S. Huang, Jianzhu...
OOPSLA
1997
Springer
14 years 2 days ago
Class Hierarchy Specialization
Class libraries are generally designed with an emphasis on versatility and extensibility. Applications that use a library typically exercise only part of the library’s functiona...
Frank Tip, Peter F. Sweeney
INFOCOM
1995
IEEE
13 years 11 months ago
Virtual Path Bandwidth Allocation in Multi-User Networks
— We consider a multiuser network that is shared by noncooperative users. Each user sets up virtual paths that optimize its own selfish performance measure. This measure account...
Aurel A. Lazar, Ariel Orda, Dimitrios E. Pendaraki...
ISCI
2008
104views more  ISCI 2008»
13 years 7 months ago
Unconditionally secure cryptosystems based on quantum cryptography
Most modern cryptographic studies design cryptosystems and algorithms using mathematical concepts. In designing and analyzing cryptosystems and protocols, mathematical concepts ar...
Yu-Fang Chung, Zhen Yu Wu, Tzer-Shyong Chen
SIGMOD
2012
ACM
202views Database» more  SIGMOD 2012»
11 years 10 months ago
MCJoin: a memory-constrained join for column-store main-memory databases
There exists a need for high performance, read-only mainmemory database systems for OLAP-style application scenarios. Most of the existing works in this area are centered around t...
Steven Keith Begley, Zhen He, Yi-Ping Phoebe Chen