Sciweavers

5948 search results - page 123 / 1190
» Computing Robust Counter-Strategies
Sort
View
HOTOS
2003
IEEE
15 years 3 months ago
Flexible OS Support and Applications for Trusted Computing
Trusted computing (e.g. TCPA and Microsoft’s NextGeneration Secure Computing Base) has been one of the most talked about and least understood technologies in the computing commu...
Tal Garfinkel, Mendel Rosenblum, Dan Boneh
86
Voted
ICCV
2009
IEEE
16 years 3 months ago
A Robust Elastic and Partial Matching Metric for Face Recognition
We present a robust elastic and partial matching metric for face recognition. To handle challenges such as pose, facial expression and partial occlusion, we enable both elastic ...
Gang Hua, Amir Akbarzadeh
CVPR
1998
IEEE
16 years 3 days ago
A Radial Cumulative Similarity Transform for Robust Image Correspondence
We develop a local image-correspondence algorithm which performs well near occluding boundaries. Unlike traditional robust methods, our method can find correspondences when the on...
Trevor Darrell
CVPR
2005
IEEE
16 years 3 days ago
Robust L1 Norm Factorization in the Presence of Outliers and Missing Data by Alternative Convex Programming
Matrix factorization has many applications in computer vision. Singular Value Decomposition (SVD) is the standard algorithm for factorization. When there are outliers and missing ...
Qifa Ke, Takeo Kanade
85
Voted
CVPR
2007
IEEE
16 years 3 days ago
Variational Bayes Based Approach to Robust Subspace Learning
This paper presents a new algorithm for the problem of robust subspace learning (RSL), i.e., the estimation of linear subspace parameters from a set of data points in the presence...
Takayuki Okatani, Koichiro Deguchi