Sciweavers

12257 search results - page 2426 / 2452
» Analysis of Algorithms
Sort
View
IEEESP
2007
98views more  IEEESP 2007»
15 years 1 months ago
Educating Students to Create Trustworthy Systems
igh level of abstraction and to provide broad oversight. In contrast, the goal of computer science security education is to provide the technicalexpertisetodevelopsecure software a...
Richard S. Swart, Robert F. Erbacher
PAMI
2006
227views more  PAMI 2006»
15 years 1 months ago
Matching 2.5D Face Scans to 3D Models
The performance of face recognition systems that use two-dimensional images depends on factors such as lighting and subject's pose. We are developing a face recognition system...
Xiaoguang Lu, Anil K. Jain, Dirk Colbry
PAMI
2006
99views more  PAMI 2006»
15 years 1 months ago
Symbolic Signatures for Deformable Shapes
Recognizing classes of objects from their shape is an unsolved problem in machine vision that entails the ability of a computer system to represent and generalize complex geometric...
Salvador Ruiz-Correa, Linda G. Shapiro, Marina Mei...
SIGIR
2008
ACM
15 years 1 months ago
A few examples go a long way: constructing query models from elaborate query formulations
We address a specific enterprise document search scenario, where the information need is expressed in an elaborate manner. In our scenario, information needs are expressed using a...
Krisztian Balog, Wouter Weerkamp, Maarten de Rijke
AES
2005
Springer
137views Cryptology» more  AES 2005»
15 years 1 months ago
Design of a multimedia processor based on metrics computation
Media-processing applications, such as signal processing, 2D and 3D graphics rendering, and image compression, are the dominant workloads in many embedded systems today. The real-...
Nader Ben Amor, Yannick Le Moullec, Jean-Philippe ...
« Prev « First page 2426 / 2452 Last » Next »