Sciweavers

998 search results - page 87 / 200
» From Feasible Proofs to Feasible Computations
Sort
View
EAAI
2008
257views more  EAAI 2008»
13 years 9 months ago
Recognition of facial expressions using Gabor wavelets and learning vector quantization
Facial expression recognition has potential applications in different aspects of day-to-day life not yet realized due to absence of effective expression recognition techniques. Th...
Shishir Bashyal, Ganesh K. Venayagamoorthy
BMVC
2010
13 years 7 months ago
Person Identification using Shadow Analysis
We introduce a novel person identification method for a surveillance system of much wider area than conventional systems using CCTV cameras. In the proposed system, we install cam...
Yumi Iwashita, Adrian Stoica, Ryo Kurazume
ACISP
2006
Springer
14 years 2 months ago
On Exact Algebraic [Non-]Immunity of S-Boxes Based on Power Functions
In this paper we are interested in algebraic immunity of several well known highly-nonlinear vectorial Boolean functions (or Sboxes), designed for block and stream ciphers. Unfortu...
Nicolas Courtois, Blandine Debraize, Eric Garrido
ACSAC
2001
IEEE
14 years 16 days ago
Verifiable Identifiers in Middleware Security
fies a number of issues related to security information r semantics on different layers of abstraction. In particular it is difficult to express caller and target accurately in the...
Ulrich Lang, Dieter Gollmann, Rudolf Schreiner
MOR
2002
94views more  MOR 2002»
13 years 8 months ago
The Complexity of Generic Primal Algorithms for Solving General Integer Programs
ngly better objective function value until an optimal solution is reached. From an abstract point of view, an augmentation problem is solved in each iteration. That is, given a fea...
Andreas S. Schulz, Robert Weismantel