Sciweavers

1086 search results - page 79 / 218
» Subspace Analysis Using Random Mixture Models
Sort
View
IMA
1997
Springer
211views Cryptology» more  IMA 1997»
13 years 12 months ago
Key Agreement Protocols and Their Security Analysis
This paper proposes new protocols for two goals: authenticated key agreement and authenticated key agreement with key con rmation in the asymmetric public-key setting. A formalm...
Simon Blake-Wilson, Don Johnson, Alfred Menezes
TNN
2011
200views more  TNN 2011»
13 years 2 months ago
Domain Adaptation via Transfer Component Analysis
Domain adaptation solves a learning problem in a target domain by utilizing the training data in a different but related source domain. Intuitively, discovering a good feature rep...
Sinno Jialin Pan, Ivor W. Tsang, James T. Kwok, Qi...
PAA
2006
13 years 7 months ago
Audio-visual sports highlights extraction using Coupled Hidden Markov Models
We present our studies on the application of Coupled Hidden Markov Models(CHMMs) to sports highlights extraction from broadcast video using both audio and video information. First,...
Ziyou Xiong
IVC
1998
65views more  IVC 1998»
13 years 7 months ago
Segmentation of MR images with intensity inhomogeneities
A statistical model to segment clinical magnetic resonance (MR) images in the presence of noise and intensity inhomogeneities is proposed. Inhomogeneities are considered to be mul...
Jagath C. Rajapakse, Frithjof Kruggel
CVPR
2007
IEEE
14 years 9 months ago
Automated Individualization of Deformable Eye Region Model and Its Application to Eye Motion Analysis
This paper proposes a method of automated individualization of eye region model. The eye region model has been proposed in past research that parameterizes both the structure and ...
Tsuyoshi Moriyama, Takeo Kanade