Sciweavers

167 search results - page 27 / 34
» Comparing Two Notions of Simulatability
Sort
View
PR
2008
137views more  PR 2008»
13 years 7 months ago
Cancellable biometrics and annotations on BioHash
Lately, the once powerful one-factor authentication which is based solely on either password, token or biometric approach, appears to be insufficient in addressing the challenges ...
Andrew Beng Jin Teoh, Yip Wai Kuan, Sangyoun Lee
TIFS
2008
133views more  TIFS 2008»
13 years 7 months ago
Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding
Abstract-- It has recently been discovered that using pseudorandom sequences as carriers in spread-spectrum techniques for data-hiding is not at all a sufficient condition for ensu...
François Cayre, Patrick Bas
TIP
2008
219views more  TIP 2008»
13 years 7 months ago
Binary Partition Trees for Object Detection
This paper discusses the use of Binary Partition Trees (BPTs) for object detection. BPTs are hierarchical region-based representations of images. They define a reduced set of regio...
Verónica Vilaplana, Ferran Marqués, ...
DESIRE
2010
13 years 2 months ago
Poetic design: an exploration of the parallels between expert poetry composition and innovative design practice
Despite parallels between the structure of poetry composition tasks and design tasks, there appears to be no previous research exploring the consequences of these correspondences ...
Erin L. Beatty, Linden J. Ball
GECCO
2011
Springer
264views Optimization» more  GECCO 2011»
12 years 11 months ago
Critical factors in the performance of novelty search
Novelty search is a recently proposed method for evolutionary computation designed to avoid the problem of deception, in which the fitness function guides the search process away...
Steijn Kistemaker, Shimon Whiteson