Sciweavers

773 search results - page 151 / 155
» On Cryptographic Assumptions and Challenges
Sort
View
JMM2
2007
218views more  JMM2 2007»
13 years 9 months ago
A Novel Method for 3D Face Detection and Normalization
—When automatically analyzing images of human faces, either for recognition in biometry applications or facial expression analysis in human machine interaction, one has to cope w...
Robert Niese, Ayoub Al-Hamadi, Bernd Michaelis
QRE
2008
140views more  QRE 2008»
13 years 9 months ago
Discrete mixtures of kernels for Kriging-based optimization
: Kriging-based exploration strategies often rely on a single Ordinary Kriging model which parametric covariance kernel is selected a priori or on the basis of an initial data set....
David Ginsbourger, Céline Helbert, Laurent ...
JSAC
2010
78views more  JSAC 2010»
13 years 8 months ago
Evolution of Internet Address Space Deaggregation: Myths and Reality
—Internet routing table size growth and BGP update churn are two prominent Internet scaling issues. There is widespread belief in a high and fast growing number of ASs that deagg...
Luca Cittadini, Wolfgang Mühlbauer, Steve Uhl...
CIKM
2010
Springer
13 years 7 months ago
Manifold ranking with sink points for update summarization
Update summarization aims to create a summary over a topic-related multi-document dataset based on the assumption that the user has already read a set of earlier documents of the ...
Pan Du, Jiafeng Guo, Jin Zhang, Xueqi Cheng
CIKM
2010
Springer
13 years 7 months ago
Automatic schema merging using mapping constraints among incomplete sources
Schema merging is the process of consolidating multiple schemas into a unified view. The task becomes particularly challenging when the schemas are highly heterogeneous and autono...
Xiang Li 0002, Christoph Quix, David Kensche, Sand...