Sciweavers

1329 search results - page 209 / 266
» Phantom faces for face analysis
Sort
View
ICCV
2007
IEEE
14 years 3 months ago
Symmetries of non-rigid shapes
Symmetry and self-similarity is the cornerstone of Nature, exhibiting itself through the shapes of natural creations and ubiquitous laws of physics. Since many natural objects are...
Daniel Raviv, Alexander M. Bronstein, Michael M. B...
IPPS
2007
IEEE
14 years 3 months ago
Experimental Evaluation of Emerging Multi-core Architectures
The trend of increasing speed and complexity in the single-core processor as stated in the Moore’s law is facing practical challenges. As a result, the multi-core processor arch...
Abdullah Kayi, Yiyi Yao, Tarek A. El-Ghazawi, Greg...
P2P
2007
IEEE
165views Communications» more  P2P 2007»
14 years 3 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang
ACCV
2007
Springer
14 years 3 months ago
Coarse-to-Fine Statistical Shape Model by Bayesian Inference
In this paper, we take a predefined geometry shape as a constraint for accurate shape alignment. A shape model is divided in two parts: fixed shape and active shape. The fixed shap...
Ran He, Stan Z. Li, Zhen Lei, ShengCai Liao
ATAL
2007
Springer
14 years 3 months ago
On the robustness of preference aggregation in noisy environments
In an election held in a noisy environment, agents may unintentionally perturb the outcome by communicating faulty preferences. We investigate this setting by introducing a theore...
Ariel D. Procaccia, Jeffrey S. Rosenschein, Gal A....