Sciweavers

490 search results - page 76 / 98
» Modeling lobed leaves
Sort
View
CRYPTO
2011
Springer
207views Cryptology» more  CRYPTO 2011»
12 years 8 months ago
Secure Computation on the Web: Computing without Simultaneous Interaction
Secure computation enables mutually suspicious parties to compute a joint function of their private inputs while providing strong security guarantees. Amongst other things, even i...
Shai Halevi, Yehuda Lindell, Benny Pinkas
ECCV
2004
Springer
14 years 10 months ago
A Boosted Particle Filter: Multitarget Detection and Tracking
The problem of tracking a varying number of non-rigid objects has two major difficulties. First, the observation models and target distributions can be highly non-linear and non-Ga...
Kenji Okuma, Ali Taleghani, Nando de Freitas, Jame...
ISBI
2008
IEEE
14 years 9 months ago
Quantified brain asymmetry for age estimation of normal and AD/MCI subjects
We propose a quantified asymmetry based method for age estimation. Our method uses machine learning to discover automatically the most discriminative asymmetry feature set from di...
Leonid Teverovskiy, James T. Becker, Oscar L. Lope...
CVPR
2010
IEEE
14 years 4 months ago
Multi-Class Object Localization by Combining Local Contextual Interactions
Recent work in object localization has shown that the use of contextual cues can greatly improve accuracy over models that use appearance features alone. Although many of these mo...
Carolina Galleguillos, Brian McFee, Gert Lanckriet
CAISE
2009
Springer
14 years 3 months ago
TomTom for Business Process Management (TomTom4BPM)
Navigation systems have proven to be quite useful for many drivers. People increasingly rely on the devices of TomTom and other vendors and find it useful to get directions to go ...
Wil M. P. van der Aalst