Sciweavers

990 search results - page 92 / 198
» Sub-Graphs of Complete Graph
Sort
View
ICIAP
2003
ACM
14 years 9 months ago
A feature-based face recognition system
A completely automatic face recognition system is presented. The method works on color and gray level images: after having localized the face and the facial features, it determine...
Paola Campadelli, Raffaella Lanzarotti, C. Savazzi
HICSS
2008
IEEE
90views Biometrics» more  HICSS 2008»
14 years 3 months ago
Power System Extreme Event Detection: The Vulnerability Frontier
In this work we apply graph theoretic tools to provide a close bound on a frontier relating the number of line outages in a grid to the power disrupted by the outages. This fronti...
Bernard C. Lesieutre, Ali Pinar, Sandip Roy
ISCIS
2004
Springer
14 years 2 months ago
Stubborn Sets for Priority Nets
Partial order methods, such as the stubborn set method and the priority method, reduce verification effort by exploiting irrelevant orders of events. We show how the stubborn set...
Kimmo Varpaaniemi
COR
2006
93views more  COR 2006»
13 years 9 months ago
Solving capacitated arc routing problems using a transformation to the CVRP
A well known transformation by Pearn, Assad and Golden reduces a Capacitated Arc Routing Problem (CARP) into an equivalent Capacitated Vehicle Routing Problem (CVRP). However, tha...
Humberto Longo, Marcus Poggi de Aragão, Edu...
PR
2006
131views more  PR 2006»
13 years 9 months ago
A face recognition system based on automatically determined facial fiducial points
In this paper a completely automatic face recognition system is presented. The method works on color images: after having localized the face and the facial features, it determines...
Stefano Arca, Paola Campadelli, Raffaella Lanzarot...