Sciweavers

198 search results - page 35 / 40
» Weak Probabilistic Anonymity
Sort
View
IBERAMIA
2010
Springer
13 years 7 months ago
A Visual Grammar for Face Detection
Several methods have been developed for face detection with certain success, however these tend to fail under difficult conditions such as partial occlusions and changes in orienta...
Augusto Meléndez, Luis Enrique Sucar, Eduar...
INFOCOM
2010
IEEE
13 years 7 months ago
Password Strength: An Empirical Analysis
—It is a well known fact that user-chosen passwords are somewhat predictable: by using tools such as dictionaries or probabilistic models, attackers and password recovery tools c...
Matteo Dell'Amico, Pietro Michiardi, Yves Roudier
CORR
2011
Springer
165views Education» more  CORR 2011»
13 years 4 months ago
The Impact of Memory Models on Software Reliability in Multiprocessors
The memory consistency model is a fundamental system property characterizing a multiprocessor. The relative merits of strict versus relaxed memory models have been widely debated ...
Alexander Jaffe, Thomas Moscibroda, Laura Effinger...
ECCV
2010
Springer
12 years 3 months ago
Voting by Grouping Dependent Parts
Hough voting methods efficiently handle the high complexity of multiscale, category-level object detection in cluttered scenes. The primary weakness of this approach is however t...
Pradeep Yarlagadda, Antonio Monroy and Bjorn Ommer
ICPR
2004
IEEE
14 years 10 months ago
An Undecimated Wavelet Transform Based Denoising, PPCA Based Pulse Modeling and Detection-Classification of PD Signals
Authors Address the problem of recognition and retrieval of relatively weak industrial signal such as Partial Discharges (PD) buried in excessive noise. The major bottleneck being...
Pradeep Kumar Shetty, T. S. Ramu