Sciweavers

2929 search results - page 110 / 586
» Robust Hand Detection
Sort
View
122
Voted
INFOCOM
2012
IEEE
13 years 5 months ago
Robust multi-source network tomography using selective probes
—Knowledge of a network’s topology and internal characteristics such as delay times or losses is crucial to maintain seamless operation of network services. Network tomography ...
Akshay Krishnamurthy, Aarti Singh
130
Voted
CVPR
2004
IEEE
16 years 4 months ago
Robust Subspace Clustering by Combined Use of kNND Metric and SVD Algorithm
Subspace clustering has many applications in computer vision, such as image/video segmentation and pattern classification. The major issue in subspace clustering is to obtain the ...
Qifa Ke, Takeo Kanade
ICIP
2002
IEEE
16 years 4 months ago
Robust bandlimited watermarking with trellis coded modulation
Digital watermarking is equivalent to bandlimited, powerlimited digital communication. The power limit is due to the requirement of imperceptible watermarks, and has long been rec...
Aria Nosratinia, Vimal Thilak
259
Voted
AVSS
2007
IEEE
15 years 9 months ago
Towards robust face recognition for Intelligent-CCTV based surveillance using one gallery image
In recent years, the use of Intelligent Closed-Circuit Television (ICCTV) for crime prevention and detection has attracted significant attention. Existing face recognition system...
Ting Shan, Shaokang Chen, Conrad Sanderson, Brian ...
INFOCOM
2007
IEEE
15 years 8 months ago
Neighborhood Watch for Internet Routing: Can We Improve the Robustness of Internet Routing Today?
— Protecting BGP routing from errors and malice is one of the next big challenges for Internet routing. Several approaches have been proposed that attempt to capture and block ro...
Georgos Siganos, Michalis Faloutsos