Sciweavers

1513 search results - page 196 / 303
» Cryptographic Pattern Matching
Sort
View
138
Voted
CVPR
2000
IEEE
15 years 6 months ago
A Combined Feature-Texture Similarity Measure for Face Alignment under
We formulate face alignment as a model-based parameter estimation problem in this paper. First, we work within a framework that combines two separate subspace models to r epresent...
Lixin Fan, Kah Kay Sung
CASES
2006
ACM
15 years 6 months ago
Incremental elaboration for run-time reconfigurable hardware designs
We present a new technique for compiling run-time reconfigurable hardware designs. Run-time reconfigurable embedded systems can deliver promising benefits over implementations in ...
Arran Derbyshire, Tobias Becker, Wayne Luk
102
Voted
CIKM
2009
Springer
15 years 5 months ago
Mining data streams with periodically changing distributions
Dynamic data streams are those whose underlying distribution changes over time. They occur in a number of application domains, and mining them is important for these applications....
Yingying Tao, M. Tamer Özsu
108
Voted
DMIN
2006
141views Data Mining» more  DMIN 2006»
15 years 3 months ago
Extracting Forensic Explanation from Intrusion Alerts
Since it is desirable for an intrusion detection system to be operated with the real time performance, it is not unusual for an intrusion detection engine to perform a "lazy ...
Bon Sy, Negmat Mullodzhanov
118
Voted
WWW
2010
ACM
15 years 2 months ago
Classification-enhanced ranking
Many have speculated that classifying web pages can improve a search engine's ranking of results. Intuitively results should be more relevant when they match the class of a q...
Paul N. Bennett, Krysta Marie Svore, Susan T. Duma...