Sciweavers

20745 search results - page 3773 / 4149
» Computer graphics for all
Sort
View
ICAPR
2009
Springer
15 years 9 months ago
Eigen-domain Relighting of Face Images for Illumination-invariant Face Verification
In this paper, we propose a method to exploit the uniqueness in the illumination variations on the face image of a subject for face verification. Using the 3D wireframe model of a...
Vinod Pathangay, Sukhendu Das
KDD
2009
ACM
173views Data Mining» more  KDD 2009»
15 years 9 months ago
Malware detection using statistical analysis of byte-level file content
Commercial anti-virus software are unable to provide protection against newly launched (a.k.a “zero-day”) malware. In this paper, we propose a novel malware detection techniqu...
S. Momina Tabish, M. Zubair Shafiq, Muddassar Faro...
CONCUR
2001
Springer
15 years 9 months ago
Extended Temporal Logic Revisited
A key issue in the design of a model-checking tool is the choice of the formal language with which properties are specified. It is now recognized that a good language should exten...
Orna Kupferman, Nir Piterman, Moshe Y. Vardi
CRYPTO
2001
Springer
111views Cryptology» more  CRYPTO 2001»
15 years 9 months ago
On the Cost of Reconstructing a Secret, or VSS with Optimal Reconstruction Phase
Consider a scenario where an l-bit secret has been distributed among n players by an honest dealer using some secret sharing scheme. Then, if all players behave honestly, the secre...
Ronald Cramer, Ivan Damgård, Serge Fehr
DIS
2001
Springer
15 years 9 months ago
Functional Trees
In the context of classification problems, algorithms that generate multivariate trees are able to explore multiple representation languages by using decision tests based on a com...
Joao Gama
« Prev « First page 3773 / 4149 Last » Next »