Sciweavers

5207 search results - page 1041 / 1042
» A proposed approach for modeling healthcare systems for unde...
Sort
View
GAMESEC
2010
244views Game Theory» more  GAMESEC 2010»
13 years 4 months ago
The Password Game: Negative Externalities from Weak Password Practices
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Sören Preibusch, Joseph Bonneau
ICPR
2010
IEEE
13 years 4 months ago
A Re-evaluation of Pedestrian Detection on Riemannian Manifolds
Abstract--Boosting covariance data on Riemannian manifolds has proven to be a convenient strategy in a pedestrian detection context. In this paper we show that the detection perfor...
Diego Tosato, Michela Farenzena, Marco Cristani, V...
CVPR
2011
IEEE
13 years 2 months ago
Real Time Head Pose Estimation with Random Regression Forests
Fast and reliable algorithms for estimating the head pose are essential for many applications and higher-level face analysis tasks. We address the problem of head pose estimation ...
Gabriele Fanelli, Juergen Gall, Luc VanGool
BMCBI
2010
137views more  BMCBI 2010»
13 years 1 months ago
The ancient history of the structure of ribonuclease P and the early origins of Archaea
Background: Ribonuclease P is an ancient endonuclease that cleaves precursor tRNA and generally consists of a catalytic RNA subunit (RPR) and one or more proteins (RPPs). It repre...
Feng-Jie Sun, Gustavo Caetano-Anollés
APVIS
2011
12 years 6 months ago
Edge maps: Representing flow with bounded error
Robust analysis of vector fields has been established as an important tool for deriving insights from the complex systems these fields model. Many analysis techniques rely on co...
Harsh Bhatia, Shreeraj Jadhav, Peer-Timo Bremer, G...
« Prev « First page 1041 / 1042 Last » Next »