Sciweavers

2250 search results - page 49 / 450
» Authorizing applications in singularity
Sort
View
CORR
2010
Springer
189views Education» more  CORR 2010»
14 years 8 months ago
Robust PCA via Outlier Pursuit
Singular Value Decomposition (and Principal Component Analysis) is one of the most widely used techniques for dimensionality reduction: successful and efficiently computable, it ...
Huan Xu, Constantine Caramanis, Sujay Sanghavi
CVPR
2010
IEEE
14 years 7 months ago
Efficient computation of robust low-rank matrix approximations in the presence of missing data using the L1 norm
The calculation of a low-rank approximation of a matrix is a fundamental operation in many computer vision applications. The workhorse of this class of problems has long been the ...
Anders Eriksson, Anton van den Hengel
ICMCS
2006
IEEE
122views Multimedia» more  ICMCS 2006»
15 years 3 months ago
An Improved Approach to the Line-Based Face Recognition
The line-based face recognition method is distinguished by its features, but its development and application is limited to some inherent drawbacks. This paper propose a method for...
Anlong Ming, Huadong Ma
ISI
2005
Springer
15 years 3 months ago
Data Distortion for Privacy Protection in a Terrorist Analysis System
Data distortion is a critical component to preserve privacy in security-related data mining applications, such as in data miningbased terrorist analysis systems. We propose a spars...
Shuting Xu, Jun Zhang, Dianwei Han, Jie Wang
ITNG
2010
IEEE
15 years 2 months ago
Conceptual Elaboration of a Geographic Intelligence Based on Service Oriented Architecture (SOA)
This paper, the first in a series of four, presents the conceptual design of a subsystem with integrative function based on a Service-Oriented Architecture (SOA), named Geographic...
Fernando Maciel Lima e Sousa, Valdevino Siqueira C...