Sciweavers

182 search results - page 28 / 37
» Identity the Civic Scenario
Sort
View
100
Voted
BMVC
2000
14 years 11 months ago
Recognising the Dynamics of Faces across Multiple Views
We present an integrated framework for dynamic face detection and recognition, where head pose is estimated using Support Vector Regression, face detection is performed by Support...
Yongmin Li, Shaogang Gong, Heather M. Liddell
CORR
2008
Springer
87views Education» more  CORR 2008»
14 years 9 months ago
The Rate Loss of Single-Letter Characterization: The "Dirty" Multiple Access Channel
For general memoryless systems, the typical information theoretic solution - when exists - has a "single-letter" form. This reflects the fact that optimum performance ca...
Tal Philosof, Ram Zamir
75
Voted
ENTCS
2008
130views more  ENTCS 2008»
14 years 9 months ago
The SPARTA Pseudonym and Authorization System
This paper deals with privacy-preserving (pseudonymized) access to a service resource. In such a scenario, two opposite needs seem to emerge. On one side, the service provider may...
Giuseppe Bianchi, M. Bonola, Vincenzo Falletta, Fr...
76
Voted
AUTOMATICA
2006
80views more  AUTOMATICA 2006»
14 years 9 months ago
State estimation over packet dropping networks using multiple description coding
For state estimation over a communication network, efficiency and reliability of the network are critical issues. The presence of packet dropping and communication delay can great...
Zhipu Jin, Vijay Gupta, Richard M. Murray
IJISEC
2006
113views more  IJISEC 2006»
14 years 9 months ago
Escrow-free encryption supporting cryptographic workflow
Since Boneh and Franklin published their seminal paper on identity based encryption (IBE) using the Weil pairing , there has been a great deal of interest in cryptographic primitiv...
Sattam S. Al-Riyami, John Malone-Lee, Nigel P. Sma...