Sciweavers

1997 search results - page 379 / 400
» Facial feature extraction using topological methods
Sort
View
SMA
2005
ACM
201views Solid Modeling» more  SMA 2005»
14 years 1 months ago
Fast and robust detection of crest lines on meshes
We propose a fast and robust method for detecting crest lines on surfaces approximated by dense triangle meshes. The crest lines, salient surface features defined via first- and...
Shin Yoshizawa, Alexander G. Belyaev, Hans-Peter S...
CCS
2004
ACM
14 years 28 days ago
Direct anonymous attestation
This paper describes the direct anonymous attestation scheme (DAA). This scheme was adopted by the Trusted Computing Group as the method for remote authentication of a hardware mo...
Ernest F. Brickell, Jan Camenisch, Liqun Chen
PPDP
2009
Springer
14 years 2 days ago
Context-based proofs of termination for typed delimited-control operators
We present direct proofs of termination of evaluation for typed delimited-control operators shift and reset using a variant of Tait’s method with context-based reducibility pred...
Malgorzata Biernacka, Dariusz Biernacki
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
13 years 11 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
ICPR
2010
IEEE
13 years 11 months ago
PILL-ID: Matching and Retrieval of Drug Pill Imprint Images
—Automatic illicit drug pill matching and retrieval is becoming an important problem due to an increase in the number of tablet type illicit drugs being circulated in our society...
Young-Bum Lee, Unsang Park, Anil Jain