Sciweavers

114 search results - page 17 / 23
» Automatic identification of key classes in a software system...
Sort
View
LCPC
1995
Springer
14 years 4 days ago
Piecewise Execution of Nested Data-Parallel Programs
Abstract. The technique of flattening nested data parallelism combines all the independent operations in nested apply-to-all constructs and generates large amounts of potential pa...
Daniel W. Palmer, Jan Prins, Siddhartha Chatterjee...
AVBPA
1997
Springer
140views Biometrics» more  AVBPA 1997»
14 years 24 days ago
Integrating Face Recognition into Security Systems
Automated processing of facial images has become a serious market for both hard- and software products. For the commercial success of face recognition systems it is most crucial th...
Volker Vetter, Thomas Zielke, Werner von Seelen
PAMI
2012
11 years 11 months ago
Trainable Convolution Filters and Their Application to Face Recognition
—In this paper, we present a novel image classification system that is built around a core of trainable filter ensembles that we call Volterra kernel classifiers. Our system trea...
Ritwik Kumar, Arunava Banerjee, Baba C. Vemuri, Ha...
SAC
2008
ACM
13 years 8 months ago
Removing useless variables in cost analysis of Java bytecode
Automatic cost analysis has interesting applications in the context of verification and certification of mobile code. For instance, the code receiver can use cost information in o...
Elvira Albert, Puri Arenas, Samir Genaim, Germ&aac...
EFORENSICS
2009
Springer
14 years 3 months ago
Vocal Forgery in Forensic Sciences
Abstract. This article describes techniques of vocal forgery able to affect automatic speaker recognition system in a forensic context. Vocal forgery covers two main aspects: voice...
Patrick Perrot, Mathieu Morel, Joseph Razik, G&eac...