Sciweavers

3918 search results - page 653 / 784
» Probabilistic model of triangulation
Sort
View
CSFW
2005
IEEE
14 years 4 months ago
A Cryptographically Sound Dolev-Yao Style Security Proof of an Electronic Payment System
We present the first cryptographically sound Dolev-Yaostyle security proof of a comprehensive electronic payment system. The payment system is a slightly simplified variant of t...
Michael Backes, Markus Dürmuth
ICDM
2005
IEEE
109views Data Mining» more  ICDM 2005»
14 years 4 months ago
Triple Jump Acceleration for the EM Algorithm
This paper presents the triple jump framework for accelerating the EM algorithm and other bound optimization methods. The idea is to extrapolate the third search point based on th...
Han-Shen Huang, Bou-Ho Yang, Chun-Nan Hsu
ICDM
2005
IEEE
116views Data Mining» more  ICDM 2005»
14 years 4 months ago
Learning Functional Dependency Networks Based on Genetic Programming
Bayesian Network (BN) is a powerful network model, which represents a set of variables in the domain and provides the probabilistic relationships among them. But BN can handle dis...
Wing-Ho Shum, Kwong-Sak Leung, Man Leung Wong
ICMCS
2005
IEEE
90views Multimedia» more  ICMCS 2005»
14 years 4 months ago
Eye Detection Under Unconstrained Background by the Terrain Feature
Locating eyes in face images is an important step for automatic face analysis and recognition. In this paper, we present a novel approach for eye detection without finding the fa...
Jun Wang, Lijun Yin
ICRA
2005
IEEE
150views Robotics» more  ICRA 2005»
14 years 4 months ago
Learning Sensor Network Topology through Monte Carlo Expectation Maximization
— We consider the problem of inferring sensor positions and a topological (i.e. qualitative) map of an environment given a set of cameras with non-overlapping fields of view. In...
Dimitri Marinakis, Gregory Dudek, David J. Fleet