Sciweavers

1879 search results - page 93 / 376
» Extending Reflective Architectures
Sort
View
80
Voted
IEEEHPCS
2010
14 years 8 months ago
An efficient method for face recognition under illumination variations
An efficient method for face recognition which is robust under illumination variations is proposed. The proposed method achieves the illumination invariants based on the reflectan...
A. Nabatchian, E. Abdel-Raheem, M. Ahmadi
83
Voted
JMLR
2010
119views more  JMLR 2010»
14 years 5 months ago
Semi-Supervised Learning via Generalized Maximum Entropy
Various supervised inference methods can be analyzed as convex duals of the generalized maximum entropy (MaxEnt) framework. Generalized MaxEnt aims to find a distribution that max...
Ayse Erkan, Yasemin Altun
81
Voted
CATS
2006
14 years 11 months ago
On the Logical Implication of Multivalued Dependencies with Null Values
The implication of multivalued dependencies (MVDs) in relational databases has originally been defined in the context of some fixed finite universe (Fagin 1977, Zaniolo 1976). Whi...
Sebastian Link
TVLSI
1998
122views more  TVLSI 1998»
14 years 9 months ago
Algorithm-based low-power transform coding architectures: the multirate approach
—In most low-power VLSI designs, the supply voltage is usually reduced to lower the total power consumption. However, the device speed will be degraded as the supply voltage goes...
An-Yeu Wu, K. J. Ray Liu
SACMAT
2005
ACM
15 years 3 months ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang