Sciweavers

760 search results - page 101 / 152
» Pedestrian Detection: A Benchmark
Sort
View
ICMCS
2009
IEEE
106views Multimedia» more  ICMCS 2009»
13 years 5 months ago
Modeling and analysis of content identification
Content fingerprinting provides a compact content-based representation of a multimedia document. An important application of fingerprinting is the identification of modified copie...
Avinash L. Varna, Min Wu
EAAI
2010
144views more  EAAI 2010»
13 years 2 months ago
Fault diagnosis of industrial systems by conditional Gaussian network including a distance rejection criterion
The purpose of this article is to present a method for industrial process diagnosis with Bayesian network, and more particularly with Conditional Gaussian Network (CGN). The inter...
Sylvain Verron, Teodor Tiplica, Abdessamad Kobi
ICASSP
2011
IEEE
12 years 11 months ago
Zero leakage quantization scheme for biometric verification
Biometrics gain increasing interest as a solution for many security issues, but privacy risks exist in case we do not protect the stored templates well. This paper presents a new ...
Joep A. de Groot, Jean-Paul M. G. Linnartz
CADE
2011
Springer
12 years 7 months ago
Exploiting Symmetry in SMT Problems
Abstract. Methods exploiting problem symmetries have been very successful in several areas including constraint programming and SAT solving. We here recast a technique to enhance t...
David Déharbe, Pascal Fontaine, Stephan Mer...
PPOPP
2006
ACM
14 years 1 months ago
Exploiting distributed version concurrency in a transactional memory cluster
We investigate a transactional memory runtime system providing scaling and strong consistency for generic C++ and SQL applications on commodity clusters. We introduce a novel page...
Kaloian Manassiev, Madalin Mihailescu, Cristiana A...