Sciweavers

529 search results - page 93 / 106
» Indexing Biometric Databases Using Pyramid Technique
Sort
View
DEXA
2001
Springer
112views Database» more  DEXA 2001»
14 years 29 days ago
An Information-Driven Framework for Image Mining
Image mining systems that can automatically extract semantically meaningful information (knowledge) from image data are increasingly in demand. The fundamental challenge in image m...
Ji Zhang, Wynne Hsu, Mong-Li Lee
COMPUTE
2011
ACM
13 years 1 days ago
Similarity analysis of legal judgments
In this paper, we have made an effort to propose approaches to find similar legal judgements by extending the popular techniques used in information retrieval and search engines...
Sushanta Kumar, P. Krishna Reddy, V. Balakista Red...
PR
2010
141views more  PR 2010»
13 years 3 months ago
On the vulnerability of face verification systems to hill-climbing attacks
In this paper, we use a hill-climbing attack algorithm based on Bayesian adaption to test the vulnerability of two face recognition systems to indirect attacks. The attacking tech...
Javier Galbally, Chris McCool, Julian Fiérr...
MM
2006
ACM
155views Multimedia» more  MM 2006»
14 years 2 months ago
Robust voting algorithm based on labels of behavior for video copy detection
This paper presents an efficient approach for copies detection in a large videos archive consisting of several hundred of hours. The video content indexing method consists of ext...
Julien Law-To, Olivier Buisson, Valérie Gou...
SIGMOD
2007
ACM
153views Database» more  SIGMOD 2007»
14 years 8 months ago
Scaling games to epic proportion
We introduce scalability for computer games as the next frontier for techniques from data management. A very important aspect of computer games is the artificial intelligence (AI)...
Walker M. White, Alan J. Demers, Christoph Koch, J...