Sciweavers

485 search results - page 13 / 97
» Continuous Spatial Authentication
Sort
View
ICIP
2002
IEEE
14 years 9 months ago
Polynomial features for robust face authentication
In this paper we introduce the DCT-mod2 facial feature extraction technique which utilizes polynomial coefficients derived from 2-D DCT coefficients of spatially neighbouring bloc...
Conrad Sanderson, Kuldip K. Paliwal
DEXA
2004
Springer
161views Database» more  DEXA 2004»
14 years 1 months ago
Computing the Topological Relationship of Complex Regions
Topological predicates between spatial objects have always been a main area of research on spatial data handling, reasoning, and query languages. The focus of research has definit...
Markus Schneider
ICIP
2008
IEEE
14 years 9 months ago
Localization of sparse image tampering via random projections
Hashes can be used to provide authentication of multimedia contents. In the case of images, a hash can be used to detect whether the data has been modified in an illegitimate way....
Marco Tagliasacchi, Giuseppe Valenzise, Stefano Tu...
BC
2006
149views more  BC 2006»
13 years 7 months ago
Learning invariant object recognition in the visual system with continuous transformations
Abstract The cerebral cortex utilizes spatiotemporal continuity in the world to help build invariant representations. In vision, these might be representations of objects. The temp...
Simon M. Stringer, G. Perry, Edmund T. Rolls, J. H...
AAAI
2011
12 years 7 months ago
Combining Learned Discrete and Continuous Action Models
Action modeling is an important skill for agents that must perform tasks in novel domains. Previous work on action modeling has focused on learning STRIPS operators in discrete, r...
Joseph Z. Xu, John E. Laird