Existing distributed hash tables provide efficient mechanisms for storing and retrieving a data item based on an exact key, but are unsuitable when the search key is similar, but ...
The wide availability of large scale databases requires more efficient and scalable tools for data understanding and knowledge discovery. In this paper, we present a method to ...
Duy-Dinh Le, Shin'ichi Satoh, Michael E. Houle, Da...
Existing authorization mechanisms fail to provide powerful and robust tools for handling security at the scale necessary for today's Internet. These mechanisms are coming unde...
Many applications require tracking and recognition of multiple faces at distances, such as in video surveillance. Such a task, dealing with non-cooperative objects is more challeng...
Rong Liu, Xiufeng Gao, Rufeng Chu, XiangXin Zhu, S...
In this paper, we present the classification sub-system of a real-time video-based face identification system which recognizes people entering through the door of a laboratory. Si...
Johannes Stallkamp, Hazim Kemal Ekenel, Rainer Sti...