Sciweavers

11325 search results - page 124 / 2265
» Active Model Selection
Sort
View
ACSW
2007
15 years 4 months ago
A Range Test Secure in the Active Adversary Model
In ACISP 2006, Peng et al proposed a novel range test technique, which tests whether the integer encrypted in a ciphertext is in an interval range. Their solution is more efficien...
Kun Peng, Ed Dawson
131
Voted
ICCV
2009
IEEE
16 years 8 months ago
Active Appearance Models with Rotation Invariant Kernels
2D Active Appearance Models (AAM) and 3D Morphable Models (3DMM) are widely used techniques. AAM provide a fast fitting process, but may represent unwanted 3D transformations un...
Onur C. Hamsici, Aleix M. Martinez
CVPR
2009
IEEE
16 years 10 months ago
On Compositional Image Alignment with an Application to Active Appearance Models
Efficient and accurate fitting of Active Appearance Models (AAM) is a key requirement for many applications. The most efficient fitting algorithm today is Inverse Compositional ...
Brian Amberg (University of Basel), Andrew Blake (...
MICCAI
2006
Springer
16 years 4 months ago
An Approach for the Automatic Cephalometric Landmark Detection Using Mathematical Morphology and Active Appearance Models
Cephalometric analysis of lateral radiographs of the head is an important diagnosis tool in orthodontics. Based on manually locating specific landmarks, it is a tedious, time-consu...
Mariano Alcañiz Raya, Sylvia Rueda
156
Voted
DBSEC
2008
136views Database» more  DBSEC 2008»
15 years 4 months ago
An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems
Pervasive computing applications typically involve cooperation among a number of entities spanning multiple organizations. Any security breach in any single entity can have very fa...
Indrajit Ray, Nayot Poolsappasit, Rinku Dewri