This paper presents a distributed Support Vector Machine (SVM) algorithm in order to detect malicious software (malware) on a network of mobile devices. The light-weight system mo...
Ashkan Sharifi Shamili, Christian Bauckhage, Tansu...
Human identity recognition is an important yet underaddressed
problem. Previous methods were strictly limited
to high quality photographs, where the principal techniques
heavily...
Learning useful and predictable features from past workloads and exploiting them well is a major source of improvement in many operating system problems. We review known parallel ...
We wish to match sets of images to sets of images where both sets are undergoing various distortions such as viewpoint and lighting changes. To this end we have developed a Joint ...
We present a component-based method and two global methods for face recognition and evaluate them with respect to robustness against pose changes. In the component system we first...