Sciweavers

980 search results - page 115 / 196
» On Negative Bases
Sort
View
SAC
2006
ACM
14 years 3 months ago
The advent of trusted computing: implications for digital forensics
The release of computer hardware devices based on “trusted computing” technologies is heralding a paradigm shift that will have profound implications for digital forensics. In...
Mike Burmester, Judie Mulholland
AMFG
2005
IEEE
314views Biometrics» more  AMFG 2005»
14 years 2 months ago
Two-Dimensional Non-negative Matrix Factorization for Face Representation and Recognition
Non-negative matrix factorization (NMF) is a recently developed method for finding parts-based representation of non-negative data such as face images. Although it has successfully...
Daoqiang Zhang, Songcan Chen, Zhi-Hua Zhou
CRV
2005
IEEE
118views Robotics» more  CRV 2005»
14 years 2 months ago
An Object Detection System using Image Reconstruction with PCA
We present an object detection system that is applied to detecting pedestrians in still images, without assuming any a priori knowledge about the image. The system works as follow...
Luis Malagón-Borja, Olac Fuentes
TCC
2004
Springer
105views Cryptology» more  TCC 2004»
14 years 2 months ago
Unfair Noisy Channels and Oblivious Transfer
In a paper from EuroCrypt’99, Damg˚ard, Kilian and Salvail show various positive and negative results on constructing Bit Commitment (BC) and Oblivious Transfer (OT) from Unfair...
Ivan Damgård, Serge Fehr, Kirill Morozov, Lo...
ECCV
2010
Springer
14 years 2 months ago
Face Liveness Detection from A Single Image with Sparse Low Rank Bilinear Discriminative Model
Spoofing with photograph or video is one of the most common manner to circumvent a face recognition system. In this paper, we present a real-time and non-intrusive method to addre...