Sciweavers

215 search results - page 25 / 43
» Indeterminacy and Rough Approximation
Sort
View
FGR
2002
IEEE
140views Biometrics» more  FGR 2002»
14 years 1 months ago
Hierarchical Wavelet Networks for Facial Feature Localization
We present a technique for facial feature localization using a two-level hierarchical wavelet network. The first level wavelet network is used for face matching, and yields an af...
Rogério Schmidt Feris, Jim Gemmell, Kentaro...
IJCNN
2000
IEEE
14 years 1 months ago
The Inefficiency of Batch Training for Large Training Sets
Multilayer perceptrons are often trained using error backpropagation (BP). BP training can be done in either a batch or continuous manner. Claims have frequently been made that bat...
D. Randall Wilson, Tony R. Martinez
COMPGEOM
1999
ACM
14 years 28 days ago
Interval Methods for Kinetic Simulations
We propose a speed-up method for discrete-event simulations, including sweep-line or -plane techniques, requiring the repeated calculation of the times at which certain discrete e...
Leonidas J. Guibas, Menelaos I. Karavelas
VISUAL
1999
Springer
14 years 26 days ago
Blobworld: A System for Region-Based Image Indexing and Retrieval
Blobworld is a system for image retrieval based on nding coherent image regions which roughly correspond to objects. Each image is automatically segmented into regions  blobs"...
Chad Carson, Megan Thomas, Serge Belongie, Joseph ...
FSE
2007
Springer
142views Cryptology» more  FSE 2007»
14 years 15 days ago
A New Class of Weak Keys for Blowfish
The reflection attack is a recently discovered self similarity analysis which is usually mounted on ciphers with many fixed points. In this paper, we describe two reflection attack...
Orhun Kara, Cevat Manap