Sciweavers

1955 search results - page 137 / 391
» Can Computers Handle Adverbs
Sort
View
CVPR
2012
IEEE
13 years 7 months ago
Spherical hashing
Many binary code encoding schemes based on hashing have been actively studied recently, since they can provide efficient similarity search, especially nearest neighbor search, an...
Jae-Pil Heo, Youngwoon Lee, Junfeng He, Shih-Fu Ch...
CVPR
2007
IEEE
16 years 6 months ago
Pose and Illumination Invariant Face Recognition in Video
The use of video sequences for face recognition has been relatively less studied than image-based approaches. In this paper, we present a framework for face recognition from video...
Yilei Xu, Amit K. Roy Chowdhury, Keyur Patel
164
Voted
ECCV
2008
Springer
16 years 6 months ago
Keypoint Signatures for Fast Learning and Recognition
Abstract. Statistical learning techniques have been used to dramatically speed-up keypoint matching by training a classifier to recognize a specific set of keypoints. However, the ...
Michael Calonder, Vincent Lepetit, Pascal Fua
107
Voted
EDBT
2010
ACM
117views Database» more  EDBT 2010»
15 years 11 months ago
Anchoring millions of distinct reads on the human genome within seconds
With the advent of next-generation DNA sequencing machines, there is an increasing need for the development of computational tools that can anchor accurately and expediently the m...
Tien Huynh, Michail Vlachos, Isidore Rigoutsos
FSE
2005
Springer
119views Cryptology» more  FSE 2005»
15 years 10 months ago
The Poly1305-AES Message-Authentication Code
Poly1305-AES is a state-of-the-art message-authentication code suitable for a wide variety of applications. Poly1305-AES computes a 16-byte authenticator of a variable-length messa...
Daniel J. Bernstein