Sciweavers

1765 search results - page 249 / 353
» Combinations of Weak Classifiers
Sort
View
147
Voted
DICTA
2007
15 years 4 months ago
Biometric Based Cryptographic Key Generation from Faces
Existing asymmetric encryption algorithms require the storage of the secret private key. Stored keys are often protected by poorly selected user passwords that can either be guess...
B. Chen, V. Chandran
120
Voted
DMIN
2007
161views Data Mining» more  DMIN 2007»
15 years 4 months ago
Efficient Summarization Based On Categorized Keywords
—The information that exists on the World Wide Web is enormous enough in order to distract the users when trying to find useful information. In order to overcome the large amount...
Christos Bouras, Vassilis Poulopoulos, Vassilis Ts...
141
Voted
DICTA
2008
15 years 4 months ago
Object Detection Using Multi-local Feature Manifolds
Many object categories are better characterized by the shape of their contour than by local appearance properties like texture or color. Multi-local features are designed in order...
Oscar M. Danielsson, Stefan Carlsson, Josephine Su...
120
Voted
ICISC
2008
123views Cryptology» more  ICISC 2008»
15 years 4 months ago
The Swiss-Knife RFID Distance Bounding Protocol
Relay attacks are one of the most challenging threats RFID will have to face in the close future. They consist in making the verifier believe that the prover is in its close vicini...
Chong Hee Kim, Gildas Avoine, François Koeu...
108
Voted
ICMLA
2008
15 years 4 months ago
Ensemble Machine Methods for DNA Binding
We introduce three ensemble machine learning methods for analysis of biological DNA binding by transcription factors (TFs). The goal is to identify both TF target genes and their ...
Yue Fan, Mark A. Kon, Charles DeLisi