Sciweavers

1805 search results - page 267 / 361
» Computationally Efficient Face Detection
Sort
View
133
Voted
ICISC
2008
123views Cryptology» more  ICISC 2008»
15 years 5 months ago
The Swiss-Knife RFID Distance Bounding Protocol
Relay attacks are one of the most challenging threats RFID will have to face in the close future. They consist in making the verifier believe that the prover is in its close vicini...
Chong Hee Kim, Gildas Avoine, François Koeu...
122
Voted
EUROIMSA
2006
141views Multimedia» more  EUROIMSA 2006»
15 years 5 months ago
Effective Organization and Visualization of Web Search Results
While searching the web, the user is often confronted by a great number of results, generally displayed in a list which is sorted according to the relevance of the results. Facing...
Nicolas Bonnel, Vincent Lemaire, Alexandre Cotarma...
132
Voted
CCR
2006
110views more  CCR 2006»
15 years 3 months ago
On the feasibility of commercial, legal P2P content distribution
A spirited panel was recently held at the 10th International Web Caching and Content Distribution workshop on the future of P2P in content distribution [1]. After more than ten ye...
Pablo Rodriguez, See-Mong Tan, Christos Gkantsidis
146
Voted
IJDMMM
2008
119views more  IJDMMM 2008»
15 years 3 months ago
A relational perspective on spatial data mining
: Remote sensing and mobile devices nowadays collect a huge amount of spatial data, which have to be analysed in order to discover interesting information about economic, social an...
Donato Malerba
129
Voted
IJCV
2006
124views more  IJCV 2006»
15 years 3 months ago
Representation Analysis and Synthesis of Lip Images Using Dimensionality Reduction
Understanding facial expressions in image sequences is an easy task for humans. Some of us are capable of lipreading by interpreting the motion of the mouth. Automatic lipreading b...
Michal Aharon, Ron Kimmel