Sciweavers

345 search results - page 9 / 69
» When Systems Loose their Identity
Sort
View
JMM2
2006
151views more  JMM2 2006»
13 years 7 months ago
On the Use of External Face Features for Identity Verification
Abstract-- In general automatic face classification applications images are captured in natural environments. In these cases, the performance is affected by variations in facial im...
Àgata Lapedriza, David Masip, Jordi Vitri&a...
SRDS
2003
IEEE
14 years 26 days ago
Autonomous Replication for High Availability in Unstructured P2P Systems
We consider the problem of increasing the availability of shared data in peer-to-peer (P2P) systems so that users can access any content, regardless of the current subset of onlin...
Francisco Matias Cuenca-Acuna, Richard P. Martin, ...
ICONS
2008
IEEE
14 years 2 months ago
Using User Preferences to Enhance Privacy in Pervasive Systems
With the increasing interest in developing pervasive computing technologies there is growing recognition of the problems of maintaining user privacy. In the Daidalos pervasive sys...
Elizabeth Papadopoulou, Sarah McBurney, Nick K. Ta...
NIPS
1997
13 years 9 months ago
Computing with Action Potentials
Most computational engineering based loosely on biology uses continuous variables to represent neural activity. Yet most neurons communicate with action potentials. The engineerin...
John J. Hopfield, Carlos D. Brody, Sam T. Roweis
ICASSP
2008
IEEE
14 years 2 months ago
Environment-invariant compensation for reverberation using linear post-filtering for minimum distortion
Speaker identification systems work quite well in controlled environments but their performance degrades severely in the presence of the reverberation that is frequently encounte...
Kshitiz Kumar, Richard M. Stern