Sciweavers

3571 search results - page 711 / 715
» Cohen and Set Theory
Sort
View
ICCV
2011
IEEE
12 years 7 months ago
Learning Universal Multi-view Age Estimator by Video Contexts
Most existing techniques for analyzing face images assume that the faces are at near-frontal poses. Generalizing to non-frontal faces is often difficult, due to a dearth of groun...
Zheng Song, Bingbing Ni, Dong Guo, Terence Sim, Sh...
3DIM
2011
IEEE
12 years 7 months ago
A Non-cooperative Game for 3D Object Recognition in Cluttered Scenes
Abstract—During the last few years a wide range of algorithms and devices have been made available to easily acquire range images. To this extent, the increasing abundance of dep...
Andrea Albarelli, Emanuele Rodolà, Filippo ...
ATAL
2011
Springer
12 years 7 months ago
A double oracle algorithm for zero-sum security games on graphs
In response to the Mumbai attacks of 2008, the Mumbai police have started to schedule a limited number of inspection checkpoints on the road network throughout the city. Algorithm...
Manish Jain, Dmytro Korzhyk, Ondrej Vanek, Vincent...
CIKM
2011
Springer
12 years 7 months ago
Tractable XML data exchange via relations
We consider data exchange for XML documents: given source and target schemas, a mapping between them, and a document conforming to the source schema, construct a target document a...
Rada Chirkova, Leonid Libkin, Juan L. Reutter
CRYPTO
2011
Springer
237views Cryptology» more  CRYPTO 2011»
12 years 7 months ago
Bi-Deniable Public-Key Encryption
In CRYPTO 1997, Canetti et al.put forward the intruiging notion of deniable encryption, which (informally) allows a sender and/or receiver, having already performed some encrypted...
Adam O'Neill, Chris Peikert, Brent Waters