Sciweavers

574 search results - page 23 / 115
» Robust Factorization
Sort
View
ICIAP
2005
ACM
14 years 10 months ago
Robust Face Recognition Based on Part-Based Localized Basis Images
In order for a subspace projection based method to be robust to local distortion and partial occlusion, the basis images generated by the method should exhibit a part-based local r...
Jongsun Kim, Juneho Yi
AMFG
2007
IEEE
327views Biometrics» more  AMFG 2007»
14 years 4 months ago
Integrating Multiple Visual Cues for Robust Real-Time 3D Face Tracking
Abstract. 3D face tracking is an important component for many computer vision applications. Most state-of-the-art tracking algorithms can be characterized as being either intensity...
Wei-Kai Liao, Douglas Fidaleo, Gérard G. Me...
GLOBECOM
2007
IEEE
14 years 4 months ago
Robust Optimization for Selecting NetFlow Points of Measurement in an IP Network
— NetFlow is a solution to make an in-depth traffic analysis possible in IP networks. Most of the telecommunication operators have already deployed it, or intend to do so, for n...
Mustapha Bouhtou, Olivier Klopfenstein
ICRA
2007
IEEE
129views Robotics» more  ICRA 2007»
14 years 4 months ago
Robust Distributed Coverage using a Swarm of Miniature Robots
Abstract— For the multi-robot coverage problem deterministic deliberative as well as probabilistic approaches have been proposed. Whereas deterministic approaches usually provide...
Nikolaus Correll, Alcherio Martinoli
ESA
2005
Springer
114views Algorithms» more  ESA 2005»
14 years 3 months ago
Making Chord Robust to Byzantine Attacks
Chord is a distributed hash table (DHT) that requires only O(logn) links per node and performs searches with latency and message cost O(logn), where n is the number of peers in the...
Amos Fiat, Jared Saia, Maxwell Young