Sciweavers

24529 search results - page 4585 / 4906
» Computing on Authenticated Data
Sort
View
NETGAMES
2006
ACM
15 years 10 months ago
Cheat detection for MMORPG on P2P environments
In recent years, MMORPG has become popular. In order to improve scalability of game system, several P2P-based architectures have been proposed. However, in P2P-based gaming archit...
Takato Izaiku, Shinya Yamamoto, Yoshihiro Murata, ...
CVPR
2009
IEEE
16 years 12 months ago
Implicit Elastic Matching with Random Projections for Pose-variant Face Recognition
We present a new approach to robust pose-variant face recognition, which exhibits excellent generalization ability even across completely different datasets due to its weak depe...
John Wright (University of Illinois), Gang Hua (Mi...
CVPR
2009
IEEE
1351views Computer Vision» more  CVPR 2009»
16 years 12 months ago
Support Vector Machines in Face Recognition with Occlusions
Support Vector Machines (SVM) are one of the most useful techniques in classification problems. One clear example is face recognition. However, SVM cannot be applied when the fe...
Aleix M. Martínez, Hongjun Jia
CVPR
2009
IEEE
16 years 11 months ago
Dictionary-Free Categorization of Very Similar Objects via Stacked Evidence Trees
Current work in object categorization discriminates among objects that typically possess gross differences which are readily apparent. However, many applications require making ...
Andrew Moldenke, Asako Yamamuro, David A. Lytle, E...
156
Voted
CVPR
2009
IEEE
3784views Computer Vision» more  CVPR 2009»
16 years 11 months ago
What is the Spatial Extent of an Object?
This paper discusses the question: Can we improve the recognition of objects by using their spatial context? We start from Bag-of-Words models and use the Pascal 2007 dataset. We u...
Arnold W. M. Smeulders, Jasper R. R. Uijlings, Rem...
« Prev « First page 4585 / 4906 Last » Next »