Sciweavers

859 search results - page 39 / 172
» The Changing Face of Cryptography
Sort
View
ICIP
2002
IEEE
14 years 9 months ago
Polynomial features for robust face authentication
In this paper we introduce the DCT-mod2 facial feature extraction technique which utilizes polynomial coefficients derived from 2-D DCT coefficients of spatially neighbouring bloc...
Conrad Sanderson, Kuldip K. Paliwal
WSC
2007
13 years 10 months ago
Emergency departments nurse allocation to face a pandemic influenza outbreak
This study proposes a nurse allocation policy to manage patient overflow during a pandemic influenza outbreak. The objective is to minimize the number of patients waiting in queue...
Florentino Rico, Ehsan Salari, Grisselle Centeno
INTERACT
2003
13 years 9 months ago
Implicit Referring as an Indication of Familiarity in Face-to-Face and Phone Conversations
: A large body of research shows that familiarity between speakers makes their use of referring expressions more effective. This paper presents two studies that suggest that it’s...
Gunnvald B. Svendsen, Bente Evjemo
PAMI
2010
219views more  PAMI 2010»
13 years 6 months ago
FRVT 2006 and ICE 2006 Large-Scale Experimental Results
— This paper describes the large-scale experimental results from the Face Recognition Vendor Test (FRVT) 2006 and the Iris Challenge Evaluation (ICE) 2006. The FRVT 2006 looks at...
P. Jonathon Phillips, W. Todd Scruggs, Alice J. O'...
ICPR
2008
IEEE
14 years 2 months ago
Hallucinating facial images and features
In facial image analysis, image resolution is an important factor which has great influence on the performance of face recognition systems. As for lowresolution face recognition p...
Bo Li, Hong Chang, Shiguang Shan, Xilin Chen, Wen ...