Sciweavers

871 search results - page 93 / 175
» Factorized Local Appearance Models
Sort
View
ECCV
2004
Springer
14 years 12 months ago
Transformation-Invariant Embedding for Image Analysis
Abstract. Dimensionality reduction is an essential aspect of visual processing. Traditionally, linear dimensionality reduction techniques such as principle components analysis have...
Ali Ghodsi, Jiayuan Huang, Dale Schuurmans
NIPS
1994
13 years 11 months ago
Morphogenesis of the Lateral Geniculate Nucleus: How Singularities Affect Global Structure
The macaque lateral geniculate nucleus (LGN) exhibits an intricate lamination pattern, which changes midway through the nucleus at a point coincident with small gaps due to the bl...
Svilen Tzonev, Klaus Schulten, Joseph G. Malpeli
ICMCS
2006
IEEE
107views Multimedia» more  ICMCS 2006»
14 years 4 months ago
On the Detection of Multiplicative Watermarks for Speech Signals in the Wavelet and DCT Domains
Blind multiplicative watermarking schemes for speech signals using wavelets and discrete cosine transform are presented. Watermarked signals are modeled using a generalized Gaussi...
Ramin Eslami, John Deller, Hayder Radha
ECAL
2005
Springer
14 years 3 months ago
Artificial Life Meets Anthropology: A Case of Aggression in Primitive Societies
One of the greatest challenges in the modern biological and social sciences has been to understand the evolution of altruistic and cooperative behaviors. General outlines of the an...
Mikhail S. Burtsev
TMC
2010
179views more  TMC 2010»
13 years 8 months ago
On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews
We explore the use of clock skew of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and accurately. The main goal behind usi...
Suman Jana, Sneha Kumar Kasera