Sciweavers

3281 search results - page 628 / 657
» Bases for parametrized iterativity
Sort
View
WACV
2005
IEEE
15 years 5 months ago
Deformation Analysis for 3D Face Matching
Current two-dimensional image based face recognition systems encounter difficulties with large facial appearance variations due to the pose, illumination and expression changes. ...
Xiaoguang Lu, Anil K. Jain
CCS
2005
ACM
15 years 5 months ago
Preventing attribute information leakage in automated trust negotiation
Automated trust negotiation is an approach which establishes trust between strangers through the bilateral, iterative disclosure of digital credentials. Sensitive credentials are ...
Keith Irwin, Ting Yu
FSE
2005
Springer
153views Cryptology» more  FSE 2005»
15 years 5 months ago
F-FCSR: Design of a New Class of Stream Ciphers
In this paper we present a new class of stream ciphers based on a very simple mechanism. The heart of our method is a Feedback with Carry Shift Registers (FCSR) automaton. This au...
François Arnault, Thierry P. Berger
IBPRIA
2005
Springer
15 years 5 months ago
Monte Carlo Localization Using SIFT Features
The ability of finding its situation in a given environment is crucial for an autonomous agent. While navigating through a space, a mobile robot must be capable of finding its lo...
Arturo Gil, Óscar Reinoso, Maria Asunci&oac...
ECCV
2010
Springer
15 years 5 months ago
Robust Multi-View Boosting with Priors
Many learning tasks for computer vision problems can be described by multiple views or multiple features. These views can be exploited in order to learn from unlabeled data, a.k.a....