Sciweavers

1552 search results - page 309 / 311
» Privacy-Preserving Face Recognition
Sort
View
CCS
2010
ACM
13 years 5 months ago
TASTY: tool for automating secure two-party computations
Secure two-party computation allows two untrusting parties to jointly compute an arbitrary function on their respective private inputs while revealing no information beyond the ou...
Wilko Henecka, Stefan Kögl, Ahmad-Reza Sadegh...
MOBISYS
2010
ACM
13 years 8 months ago
MAUI: making smartphones last longer with code offload
This paper presents MAUI, a system that enables fine-grained energy-aware offload of mobile code to the infrastructure. Previous approaches to these problems either relied heavily...
Eduardo Cuervo, Aruna Balasubramanian, Dae-ki Cho,...
IJCV
2008
192views more  IJCV 2008»
13 years 5 months ago
Learning to Locate Informative Features for Visual Identification
Object identification (OID) is specialized recognition where the category is known (e.g. cars) and the algorithm recognizes an object's exact identity (e.g. Bob's BMW). ...
Andras Ferencz, Erik G. Learned-Miller, Jitendra M...
PR
2008
161views more  PR 2008»
13 years 5 months ago
A study on three linear discriminant analysis based methods in small sample size problem
In this paper, we make a study on three Linear Discriminant Analysis (LDA) based methods: Regularized Discriminant Analysis (RDA), Discriminant Common Vectors (DCV) and Maximal Ma...
Jun Liu, Songcan Chen, Xiaoyang Tan
PRL
2008
152views more  PRL 2008»
13 years 5 months ago
WND-CHARM: Multi-purpose image classification using compound image transforms
We describe a multi-purpose image classifier that can be applied to a wide variety of image classification tasks without modifications or fine-tuning, and yet provide classificati...
Nikita Orlov, Lior Shamir, Tomasz J. Macura, Josia...