Sciweavers

1003 search results - page 164 / 201
» Extending the Adaptability of Reference Models
Sort
View
CVPR
2009
IEEE
1234views Computer Vision» more  CVPR 2009»
16 years 8 months ago
Robustifying Eye Center Localization by Head Pose Cues
Head pose and eye location estimation are two closely related issues which refer to similar application areas. In recent years, these problems have been studied individually in ...
Roberto Valenti, Theo Gevers, Zeynep Yücel
SACMAT
2005
ACM
15 years 7 months ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang
CRYPTO
2006
Springer
112views Cryptology» more  CRYPTO 2006»
15 years 5 months ago
On Signatures of Knowledge
In a traditional signature scheme, a signature on a message m is issued under a public key PK, and can be interpreted as follows: "The owner of the public key PK and its corr...
Melissa Chase, Anna Lysyanskaya
IPM
2008
100views more  IPM 2008»
15 years 1 months ago
Query-level loss functions for information retrieval
Many machine learning technologies such as support vector machines, boosting, and neural networks have been applied to the ranking problem in information retrieval. However, since...
Tao Qin, Xu-Dong Zhang, Ming-Feng Tsai, De-Sheng W...
SEMWEB
2007
Springer
15 years 7 months ago
Semantic Enterprise Technologies
Abstract. Nowadays enterprises request information technologies that leverage structured and unstructured information for providing a single integrated view of business problems in...
Massimo Ruffolo, Luigi Guadagno, Inderbir Sidhu