Sciweavers

2395 search results - page 184 / 479
» A comparative study of two object recognition methods
Sort
View
168
Voted
COMPSAC
2009
IEEE
15 years 1 months ago
Towards Usable Solutions to Graphical Password Hotspot Problem
Click based graphical passwords that use background images suffer from hot-spot problem. Previous graphical password schemes based on recognition of images do not have a sufficient...
Kemal Bicakci, Nart Bedin Atalay, Mustafa Yuceel, ...
109
Voted
VLSID
2004
IEEE
112views VLSI» more  VLSID 2004»
16 years 4 months ago
Comparison of Effectiveness of Current Ratio and Delta-IDDQ Tests
IDDQ test is a valuable test method for semiconductor manufacturers. However, its effectiveness is reduced for deep sub-micron technology chips due to rising background leakage. C...
Sagar S. Sabade, D. M. H. Walker
SMC
2010
IEEE
202views Control Systems» more  SMC 2010»
15 years 2 months ago
Evaluating the performance of nonnegative matrix factorization for constructing semantic spaces: Comparison to latent semantic a
—This study examines the ability of nonnegative matrix factorization (NMF) as a method for constructing semantic spaces, in which the meaning of each word is represented by a hig...
Akira Utsumi
PAKDD
2004
ACM
183views Data Mining» more  PAKDD 2004»
15 years 9 months ago
Constraint-Based Graph Clustering through Node Sequencing and Partitioning
This paper proposes a two-step graph partitioning method to discover constrained clusters with an objective function that follows the well-known minmax clustering principle. Compar...
Yu Qian, Kang Zhang, Wei Lai
ECCV
2006
Springer
16 years 6 months ago
Face Recognition from Video Using the Generic Shape-Illumination Manifold
Abstract. In spite of over two decades of intense research, illumination and pose invariance remain prohibitively challenging aspects of face recognition for most practical applica...
Ognjen Arandjelovic, Roberto Cipolla