Sciweavers

7978 search results - page 1269 / 1596
» Combining shared-coin algorithms
Sort
View
WWW
2005
ACM
15 years 10 months ago
A semantic-link-based infrastructure for web service discovery in P2P networks
An important issue arising from P2P applications is how to accurately and efficiently retrieve the required Web services from large-scale repositories. This paper resolves this is...
Jie Liu, Hai Zhuge
ATAL
2005
Springer
15 years 10 months ago
Task delegation using experience-based multi-dimensional trust
Cooperation among autonomous agents involves an inherent degree of uncertainty. Agents determine for themselves when to initiate cooperation or to assist others, when to rescind c...
Nathan Griffiths
AVBPA
2005
Springer
350views Biometrics» more  AVBPA 2005»
15 years 10 months ago
Pose Invariant Face Recognition Under Arbitrary Illumination Based on 3D Face Reconstruction
Pose and illumination changes from picture to picture are two main barriers toward full automatic face recognition. In this paper, a novel method to handle both pose and lighting c...
Xiujuan Chai, Laiyun Qing, Shiguang Shan, Xilin Ch...
AVBPA
2005
Springer
226views Biometrics» more  AVBPA 2005»
15 years 10 months ago
Discriminant Analysis Based on Kernelized Decision Boundary for Face Recognition
A novel nonlinear discriminant analysis method, Kernelized Decision Boundary Analysis (KDBA), is proposed in our paper, whose Decision Boundary feature vectors are the normal vecto...
Baochang Zhang, Xilin Chen, Wen Gao
CHES
2005
Springer
108views Cryptology» more  CHES 2005»
15 years 10 months ago
Further Hidden Markov Model Cryptanalysis
We extend the model of Karlof and Wagner for modelling side channel attacks via Input Driven Hidden Markov Models (IDHMM) to the case where not every state corresponds to a single ...
P. J. Green, Richard Noad, Nigel P. Smart
« Prev « First page 1269 / 1596 Last » Next »