In this paper, we present a scheme for face authentication in the presence of variations. To deal with variations, such as facial expressions and registration errors, with which t...
Xiaoming Liu 0002, Tsuhan Chen, B. V. K. Vijaya Ku...
Robustness analysis research has shown that conventional memory-based recommender systems are very susceptible to malicious profile-injection attacks. A number of attack models h...
Recently the problem of dimensionality reduction (or, subspace learning) has received a lot of interests in many fields of information processing, including data mining, informati...
This paper proposes a technique for three-dimensional reconstruction of an underwater environment from range views acquired by an acoustic camera. The final target of the work lie...
Abstract. We describe a flexible object recognition and modelling system (FORMS) which represents and recognizes animate objects from their silhouettes. This consists of a model fo...