Sciweavers

10414 search results - page 1783 / 2083
» An efficient algorithm for Co-segmentation
Sort
View
FGR
2004
IEEE
159views Biometrics» more  FGR 2004»
15 years 7 months ago
Null Space-based Kernel Fisher Discriminant Analysis for Face Recognition
The null space-based LDA takes full advantage of the null space while the other methods remove the null space. It proves to be optimal in performance. From the theoretical analysi...
Wei Liu, Yunhong Wang, Stan Z. Li, Tieniu Tan
FGR
2004
IEEE
231views Biometrics» more  FGR 2004»
15 years 7 months ago
A Boosted Classifier Tree for Hand Shape Detection
The ability to detect a persons unconstrained hand in a natural video sequence has applications in sign language, gesture recognition and HCI. This paper presents a novel, unsuper...
Eng-Jon Ong, Richard Bowden
DAC
2006
ACM
15 years 7 months ago
Refined statistical static timing analysis through
Statistical static timing analysis (SSTA) has been a popular research topic in recent years. A fundamental issue with applying SSTA in practice today is the lack of reliable and e...
Benjamin N. Lee, Li-C. Wang, Magdy S. Abadir
149
Voted
DAGM
2006
Springer
15 years 7 months ago
On-Line, Incremental Learning of a Robust Active Shape Model
Abstract. Active Shape Models are commonly used to recognize and locate different aspects of known rigid objects. However, they require an off-line learning stage, such that the ex...
Michael Fussenegger, Peter M. Roth, Horst Bischof,...
DAWAK
2006
Springer
15 years 7 months ago
Achieving k-Anonymity by Clustering in Attribute Hierarchical Structures
Abstract. Individual privacy will be at risk if a published data set is not properly de-identified. k-anonymity is a major technique to de-identify a data set. A more general view ...
Jiuyong Li, Raymond Chi-Wing Wong, Ada Wai-Chee Fu...
« Prev « First page 1783 / 2083 Last » Next »