Sciweavers

3677 search results - page 618 / 736
» Is a probabilistic modeling
Sort
View
CHES
2006
Springer
81views Cryptology» more  CHES 2006»
15 years 7 months ago
Template Attacks in Principal Subspaces
Side-channel attacks are a serious threat to implementations of cryptographic algorithms. Secret information is recovered based on power consumption, electromagnetic emanations or ...
Cédric Archambeau, Eric Peeters, Fran&ccedi...
168
Voted
CVPR
2009
IEEE
16 years 10 months ago
Maximizing Intra-individual Correlations for Face Recognition Across Pose Differences
The variations of pose lead to significant performance decline in face recognition systems, which is a bottleneck in face recognition. A key problem is how to measure the simila...
Annan Li (Chinese Academy of Sciences), Shiguang S...
148
Voted
ICCV
2009
IEEE
16 years 8 months ago
Scene Shape Priors for Superpixel Segmentation
Unsupervised over-segmentation of an image into superpixels is a common preprocessing step for image parsing algorithms. Superpixels are used as both regions of support for feat...
Alastair P. Moore, Simon J. D. Prince, Jonathan Wa...
176
Voted
CVPR
1998
IEEE
16 years 5 months ago
An Optimized Interaction Strategy for Bayesian Relevance Feedback
A new algorithm and systematic evaluation is presented for searching a database via relevance feedback. It represents a new image display strategy for the PicHunter system [2, 1]....
Ingemar J. Cox, Matthew L. Miller, Thomas P. Minka...
ICCV
2003
IEEE
16 years 5 months ago
Recognising Panoramas
The problem considered in this paper is the fully automatic construction of panoramas. Fundamentally, this problem requires recognition, as we need to know which parts of the pano...
Matthew Brown, David G. Lowe