Sciweavers

5740 search results - page 977 / 1148
» Application of Level Set Methods in Computer Vision
Sort
View
IJON
2007
88views more  IJON 2007»
15 years 2 months ago
Information maximization in face processing
This perspective paper explores principles of unsupervised learning and how they relate to face recognition. Dependency coding and information maximization appear to be central pr...
Marian Stewart Bartlett
NAR
2011
208views Computer Vision» more  NAR 2011»
14 years 5 months ago
The UCSC Genome Browser database: update 2011
The University of California, Santa Cruz Genome Browser (http://genome.ucsc.edu) offers online access to a database of genomic sequence and annotation data for a wide variety of o...
Pauline A. Fujita, Brooke L. Rhead, Ann S. Zweig, ...
119
Voted
IACR
2011
86views more  IACR 2011»
14 years 2 months ago
Protecting Drive Encryption Systems Against Memory Attacks
Software drive encryption systems are vulnerable to memory attacks, in which an attacker gains physical accesses to the unattended computer, obtains the decryption keys from memor...
Leo Dorrendorf
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
15 years 24 days ago
Scalable similarity search with optimized kernel hashing
Scalable similarity search is the core of many large scale learning or data mining applications. Recently, many research results demonstrate that one promising approach is creatin...
Junfeng He, Wei Liu, Shih-Fu Chang
MHCI
2004
Springer
15 years 7 months ago
Interactive Positioning Based on Object Visibility
Abstract. In this paper we describe a new method and user interface for interactive positioning of a mobile device. The key element of this method is a questionanswer style dialogu...
Christian Kray, Gerd Kortuem