Sciweavers

12052 search results - page 2194 / 2411
» computer 2010
Sort
View
ICPR
2010
IEEE
14 years 2 months ago
Detecting Altered Fingerprints
Abstract--The widespread deployment of Automated Fingerprint Identification Systems (AFIS) in law enforcement and border control applications has heightened the need for ensuring t...
Jianjiang Feng, Anil Jain, Arun Ross
TCS
2010
13 years 8 months ago
Invariant games
In the context of 2-player removal games, we deļ¬ne the notion of invariant game for which each allowed move is independent of the position it is played from. We present a family ...
Éric Duchêne, Michel Rigo
STOC
2010
ACM
168views Algorithms» more  STOC 2010»
14 years 7 months ago
Non-commutative circuits and the sum-of-squares problem
We initiate a direction for proving lower bounds on the size of non-commutative arithmetic circuits. This direction is based on a connection between lower bounds on the size of no...
Pavel Hrubes, Avi Wigderson and Amir Yehudayoff
ECCV
2010
Springer
14 years 2 months ago
Geometric Constraints for Human Detection in Aerial Imagery
In this paper, we propose a method for detecting humans in imagery taken from a UAV. This is a challenging problem due to small number of pixels on target, which makes it more diļ¬...
EUROSYS
2010
ACM
14 years 7 months ago
Splitter: A Proxy-based Approach for Post-Migration Testing of Web Applications
The beneļ¬ts of virtualized IT environments, such as compute clouds, have drawn interested enterprises to migrate their applications onto new platforms to gain the advantages of ...
Xiaoning Ding, Hai Huang, Yaoping Ruan, Anees Shai...
« Prev « First page 2194 / 2411 Last » Next »