Sciweavers

2414 search results - page 121 / 483
» Computing Normal Subgroups
Sort
View
CCECE
2006
IEEE
14 years 3 months ago
Using Red-Eye to Improve Face Detection in Low Quality Video Images
This paper presents a method to improve face detection by locating eyes in an image using infrared (IR) light. IR light produces Red-Eye effect making the pupil to shine more tha...
Richard Youmaran, Andy Adler
ACG
2006
Springer
14 years 3 months ago
Solving Probabilistic Combinatorial Games
Probabilistic combinatorial games (PCG) are a model for Go-like games recently introduced by Ken Chen. They differ from normal combinatorial games since terminal position in each ...
Ling Zhao, Martin Müller 0003
DSN
2003
IEEE
14 years 2 months ago
Masquerade Detection Using Enriched Command Lines
A masquerade attack, in which one user impersonates another, is among the most serious forms of computer abuse, largely because such attacks are often mounted by insiders, and can...
Roy A. Maxion
DSN
2002
IEEE
14 years 2 months ago
Masquerade Detection Using Truncated Command Lines
A masquerade attack, in which one user impersonates another, can be the most serious form of computer abuse. Automatic discovery of masqueraders is sometimes undertaken by detecti...
Roy A. Maxion, Tahlia N. Townsend
SSPR
2000
Springer
14 years 19 days ago
A New Approximation Method of the Quadratic Discriminant Function
Abstract. For many statistical pattern recognition methods, distributions of sample vectors are assumed to be normal, and the quadratic discriminant function derived from the proba...
Shinichiro Omachi, Fang Sun, Hirotomo Aso