Sciweavers

1940 search results - page 79 / 388
» Graph Transformation with Variables
Sort
View
ICASSP
2011
IEEE
14 years 7 months ago
BEMD for expression transformation in face recognition
This work presents a novel methodology for the transformation of facial expressions, to assist face biometrics. It is known that identification using only one image per subject p...
Hoda Mohammadzade, Foteini Agrafioti, Jiexin Gao, ...
HIPC
2000
Springer
15 years 6 months ago
Improving Offset Assignment on Embedded Processors Using Transformations
Embedded systems consisting of the application program ROM, RAM, the embedded processor core and any custom hardware on a single wafer are becoming increasingly common in areas suc...
Sunil Atri, J. Ramanujam, Mahmut T. Kandemir
ICML
2000
IEEE
15 years 7 months ago
Mutual Information in Learning Feature Transformations
We present feature transformations useful for exploratory data analysis or for pattern recognition. Transformations are learned from example data sets by maximizing the mutual inf...
Kari Torkkola, William M. Campbell
ISCAPDCS
2004
15 years 4 months ago
Semantic Encryption Transformation Scheme
We present a scheme to protect mobile code from malicious hosts. We propose a transformation scheme that changes the semantics of a program using pseudorandom I/O scrambling, cond...
Willard Thompson, Alec Yasinsac, J. Todd McDonald
IACR
2011
156views more  IACR 2011»
14 years 2 months ago
Fortification of AES with Dynamic Mix-Column Transformation
MDS Matrix has an important role in the design of Rijndael Cipher and is the most expensive component of the cipher. It is also used as a perfect diffusion primitive in some other ...
Ghulam Murtaza, Azhar Ali Khan, Syed Wasi Alam, Aq...