Sciweavers

1099 search results - page 184 / 220
» String Transformation Learning
Sort
View
FGR
2011
IEEE
255views Biometrics» more  FGR 2011»
13 years 1 months ago
Beyond simple features: A large-scale feature search approach to unconstrained face recognition
— Many modern computer vision algorithms are built atop of a set of low-level feature operators (such as SIFT [1], [2]; HOG [3], [4]; or LBP [5], [6]) that transform raw pixel va...
David D. Cox, Nicolas Pinto
ICCV
2011
IEEE
12 years 9 months ago
Hough-based Tracking of Non-Rigid Objects
Online learning has shown to be successful in tracking of previously unknown objects. However, most approaches are limited to a bounding-box representation with fixed aspect rati...
Martin Godec, Peter M. Roth, Horst Bischof
PKC
2009
Springer
166views Cryptology» more  PKC 2009»
14 years 10 months ago
Security of Blind Signatures under Aborts
We explore the security of blind signatures under aborts where the user or the signer may stop the interactive signature issue protocol prematurely. Several works on blind signatur...
Dominique Schröder, Marc Fischlin
EUROSYS
2008
ACM
14 years 6 months ago
Documenting and automating collateral evolutions in linux device drivers
The internal libraries of Linux are evolving rapidly, to address new requirements and improve performance. These evolutions, however, entail a massive problem of collateral evolut...
Yoann Padioleau, Julia L. Lawall, René Rydh...
ICMCS
1999
IEEE
126views Multimedia» more  ICMCS 1999»
14 years 1 months ago
Error Spreading: Reducing Bursty Errors in Continuous Media Streaming
With the growing popularity of the Internet, there is increasing interest in using it for audio and video transmission. Periodic network overloads, leading to bursty packet losses...
Hung Q. Ngo, Srivatsan Varadarajan, Jaideep Srivas...