Sciweavers

144227 search results - page 59 / 28846
» Using
Sort
View
ISVC
2010
Springer
13 years 8 months ago
Face Recognition in Videos Using Adaptive Graph Appearance Models
Abstract. In this paper, we present a novel graph, sub-graph and supergraph based face representation which captures the facial shape changes and deformations caused due to pose ch...
Gayathri Mahalingam, Chandra Kambhamettu
RFIDSEC
2010
13 years 8 months ago
Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones
NFC is a standardised technology providing short-range RFID communication channels for mobile devices. Peer-to-peer applications for mobile devices are receiving increased interest...
Lishoy Francis, Gerhard P. Hancke, Keith Mayes, Ko...
CMA
2010
183views more  CMA 2010»
13 years 7 months ago
Ramanujan's class invariants and their use in elliptic curve cryptography
Complex Multiplication (CM) method is a frequently used method for the generation of elliptic curves (ECs) over a prime field Fp. The most demanding and complex step of this metho...
Elisavet Konstantinou, Aristides Kontogeorgis
CVPR
2011
IEEE
13 years 7 months ago
Learning Better Image Representations Using 'Flobject Analysis'
Unsupervised learning can be used to extract image representations that are useful for various and diverse vision tasks. After noticing that most biological vision systems for int...
Inmar Givoni, Patrick Li, Brendan Frey
CDC
2010
IEEE
141views Control Systems» more  CDC 2010»
13 years 5 months ago
Using computer games for hybrid systems controller synthesis
Abstract-- We propose a formal method for feedback controller synthesis using interactive computer programs with graphical interface (in short, computer games). The main theoretica...
A. Agung Julius, Sina Afshari