Sciweavers

3370 search results - page 441 / 674
» Correlation Embedding Analysis
Sort
View
AVBPA
2003
Springer
582views Biometrics» more  AVBPA 2003»
15 years 6 months ago
Performance Evaluation of Face Recognition Algorithms on the Asian Face Database, KFDB
Human face is one of the most common and useful keys to a person’s identity. Many algorithms have been developed for automatic face recognition. And a number of commercial produc...
Bon-Woo Hwang, Hyeran Byun, Myung-Cheol Roh, Seong...
86
Voted
HICSS
2002
IEEE
98views Biometrics» more  HICSS 2002»
15 years 5 months ago
Growth and Propagation of Disturbances in a Communication Network Model
In a society in which information is one of the highest-valued commodities, information networks are the economic backbone. Therefore, network vulnerability is a major hazard. Ana...
David E. Newman, Nathaniel D. Sizemore, Vickie E. ...
RECSYS
2009
ACM
15 years 5 months ago
Effective diverse and obfuscated attacks on model-based recommender systems
Robustness analysis research has shown that conventional memory-based recommender systems are very susceptible to malicious profile-injection attacks. A number of attack models h...
Zunping Cheng, Neil Hurley
ICRA
2000
IEEE
83views Robotics» more  ICRA 2000»
15 years 5 months ago
Force Controllable Hydro-Elastic Actuator
— We present a hydro-elastic actuator that has a linear spring intentionally placed in series between the hydraulic piston and actuator output. The spring strain is measured to g...
David W. Robinson, Gill A. Pratt
102
Voted
SSIAI
2000
IEEE
15 years 5 months ago
Pairwise Markov Random Fields and its Application in Textured Images Segmentation
The use of random fields, which allows one to take into account the spatial interaction among random variables in complex systems, is a frequent tool in numerous problems of stati...
Wojciech Pieczynski, Abdel-Nasser Tebbache