Sciweavers

653 search results - page 122 / 131
» Efficient reconstruction from non-uniform point sets
Sort
View
PR
2010
141views more  PR 2010»
14 years 4 months ago
On the vulnerability of face verification systems to hill-climbing attacks
In this paper, we use a hill-climbing attack algorithm based on Bayesian adaption to test the vulnerability of two face recognition systems to indirect attacks. The attacking tech...
Javier Galbally, Chris McCool, Julian Fiérr...
MIR
2004
ACM
154views Multimedia» more  MIR 2004»
15 years 2 months ago
Fast and robust short video clip search using an index structure
In this paper, we present an index structure-based method to fast and robustly search short video clips in large video collections. First we temporally segment a given long video ...
Junsong Yuan, Ling-Yu Duan, Qi Tian, Changsheng Xu
BMCBI
2008
139views more  BMCBI 2008»
14 years 9 months ago
A topological transformation in evolutionary tree search methods based on maximum likelihood combining p-ECR and neighbor joinin
Background: Inference of evolutionary trees using the maximum likelihood principle is NP-hard. Therefore, all practical methods rely on heuristics. The topological transformations...
Maozu Guo, Jian-Fu Li, Yang Liu
CRITICAL
2005
14 years 11 months ago
A manifesto for the performative development of ubiquitous media
This paper addresses design agendas in Human-Computer Interaction and neighbouring fields motivated by the mixing of areas that were mostly kept separate until recently, such as m...
Carlo Jacucci, Giulio Jacucci, Ina Wagner, Thomas ...
BMCBI
2004
127views more  BMCBI 2004»
14 years 9 months ago
Optimized LOWESS normalization parameter selection for DNA microarray data
Background: Microarray data normalization is an important step for obtaining data that are reliable and usable for subsequent analysis. One of the most commonly utilized normaliza...
John A. Berger, Sampsa Hautaniemi, Anna-Kaarina J&...