Sciweavers

1971 search results - page 306 / 395
» A clustering method that uses lossy aggregation of data
Sort
View
DRM
2007
Springer
15 years 6 months ago
Randomized radon transforms for biometric authentication via fingerprint hashing
We present a new technique for generating biometric fingerprint hashes, or summaries of information contained in human fingerprints. Our method calculates and aggregates various...
Mariusz H. Jakubowski, Ramarathnam Venkatesan
144
Voted
CVPR
2006
IEEE
16 years 2 months ago
Unsupervised Learning of Categories from Sets of Partially Matching Image Features
We present a method to automatically learn object categories from unlabeled images. Each image is represented by an unordered set of local features, and all sets are embedded into...
Kristen Grauman, Trevor Darrell
127
Voted
CVPR
2011
IEEE
14 years 8 months ago
Collaborative Personalization of Image Enhancement
While most existing enhancement tools for photographs have universal auto-enhancement functionality, recent research [8] shows that users can have personalized preferences. In thi...
Juan Caicedo, Ashish Kapoor, Sing Bing Kang
94
Voted
FAST
2003
15 years 2 months ago
Block-Level Security for Network-Attached Disks
We propose a practical and efficient method for adding security to network-attached disks (NADs). In contrast to previous work, our design requires no changes to the data layout ...
Marcos Kawazoe Aguilera, Minwen Ji, Mark Lillibrid...
DGO
2007
133views Education» more  DGO 2007»
15 years 2 months ago
A toolbox for the choice of indicator classes for ranking of watersheds
There has been considerable work on determining a suitable method to accomplish a satisfactory ordering of a group of objects, when there are multiple evaluation criteria. A weigh...
K. Sham Bhat