Sciweavers

1765 search results - page 249 / 353
» Combinations of Weak Classifiers
Sort
View
DICTA
2007
13 years 11 months ago
Biometric Based Cryptographic Key Generation from Faces
Existing asymmetric encryption algorithms require the storage of the secret private key. Stored keys are often protected by poorly selected user passwords that can either be guess...
B. Chen, V. Chandran
DMIN
2007
161views Data Mining» more  DMIN 2007»
13 years 11 months ago
Efficient Summarization Based On Categorized Keywords
—The information that exists on the World Wide Web is enormous enough in order to distract the users when trying to find useful information. In order to overcome the large amount...
Christos Bouras, Vassilis Poulopoulos, Vassilis Ts...
DICTA
2008
13 years 11 months ago
Object Detection Using Multi-local Feature Manifolds
Many object categories are better characterized by the shape of their contour than by local appearance properties like texture or color. Multi-local features are designed in order...
Oscar M. Danielsson, Stefan Carlsson, Josephine Su...
ICISC
2008
123views Cryptology» more  ICISC 2008»
13 years 11 months ago
The Swiss-Knife RFID Distance Bounding Protocol
Relay attacks are one of the most challenging threats RFID will have to face in the close future. They consist in making the verifier believe that the prover is in its close vicini...
Chong Hee Kim, Gildas Avoine, François Koeu...
ICMLA
2008
13 years 11 months ago
Ensemble Machine Methods for DNA Binding
We introduce three ensemble machine learning methods for analysis of biological DNA binding by transcription factors (TFs). The goal is to identify both TF target genes and their ...
Yue Fan, Mark A. Kon, Charles DeLisi