Sciweavers

1564 search results - page 170 / 313
» Extensions to the Estimation Calculus
Sort
View
FGR
2008
IEEE
322views Biometrics» more  FGR 2008»
15 years 11 months ago
Statistical appearance models for automatic pose invariant face recognition
Recent pose invariant methods try to model the subject specific appearance change across pose. For this, however, almost all of the existing methods require a perfect alignment b...
M. Saquib Sarfraz, Olaf Hellwich
INFOCOM
2006
IEEE
15 years 10 months ago
Interference-Aware Channel Assignment in Multi-Radio Wireless Mesh Networks
— The capacity problem in wireless mesh networks can be alleviated by equipping the mesh routers with multiple radios tuned to non-overlapping channels. However, channel assignme...
Krishna N. Ramachandran, Elizabeth M. Belding-Roye...
COMPSAC
2005
IEEE
15 years 10 months ago
Protecting Users Against Phishing Attacks with AntiPhish
Phishing is a form of online identity theft that aims to steal sensitive information such as online banking passwords and credit card information from users. Phishing scams have b...
Engin Kirda, Christopher Krügel
DATE
2010
IEEE
155views Hardware» more  DATE 2010»
15 years 9 months ago
Scheduling and energy-distortion tradeoffs with operational refinement of image processing
— Ubiquitous image processing tasks (such as transform decompositions, filtering and motion estimation) do not currently provide graceful degradation when their clock-cycles budg...
Davide Anastasia, Yiannis Andreopoulos
CSE
2008
IEEE
15 years 6 months ago
Application Specific Processors for Multimedia Applications
A well-known challenge during processor design is to obtain best possible results for a typical target application domain by combining flexibility and computational performance. A...
Rashid Muhammad, Ludovic Apvrille, Renaud Pacalet