Sciweavers

3305 search results - page 604 / 661
» Can we Rely on SQL
Sort
View
PR
2006
117views more  PR 2006»
13 years 8 months ago
On transforming statistical models for non-frontal face verification
: We address the pose mismatch problem which can occur in face verification systems that have only a single (frontal) face image available for training. In the framework of a Bayes...
Conrad Sanderson, Samy Bengio, Yongsheng Gao
ITIIS
2010
137views more  ITIIS 2010»
13 years 7 months ago
Improving the Availability of Scalable on-demand Streams by Dynamic Buffering on P2P Networks
In peer-to-peer (P2P) on-demand streaming networks, the alleviation of server load depends on reciprocal stream sharing among peers. In general, on-demand video services enable cl...
Chow-Sing Lin
EUROPKI
2009
Springer
13 years 6 months ago
Automatic Generation of Sigma-Protocols
Efficient zero-knowledge proofs of knowledge (ZK-PoK) are basic building blocks of many cryptographic applications such as identification schemes, group signatures, and secure mult...
Endre Bangerter, Thomas Briner, Wilko Henecka, Ste...
TSE
2012
11 years 11 months ago
Does Software Process Improvement Reduce the Severity of Defects? A Longitudinal Field Study
— As firms increasingly rely on information systems to perform critical functions the consequences of software defects can be catastrophic. Although the software engineering lite...
Donald E. Harter, Chris F. Kemerer, Sandra Slaught...
CVPR
2004
IEEE
14 years 11 months ago
Learning Object Detection from a Small Number of Examples: The Importance of Good Features
Face detection systems have recently achieved high detection rates[11, 8, 5] and real-time performance[11]. However, these methods usually rely on a huge training database (around...
Kobi Levi, Yair Weiss