Sciweavers

6103 search results - page 955 / 1221
» Multimedia Retrieval Algorithmics
Sort
View
115
Voted
WOWMOM
2005
ACM
127views Multimedia» more  WOWMOM 2005»
15 years 8 months ago
Game Theoretic Power Aware Wireless Data Access
Abstract—This paper examines the following wireless data access scenario: a number of clients are interested in a set of data items kept at the server. A client sends a query req...
Mark Kai Ho Yeung, Yu-Kwong Kwok
167
Voted
AVBPA
2005
Springer
350views Biometrics» more  AVBPA 2005»
15 years 8 months ago
Pose Invariant Face Recognition Under Arbitrary Illumination Based on 3D Face Reconstruction
Pose and illumination changes from picture to picture are two main barriers toward full automatic face recognition. In this paper, a novel method to handle both pose and lighting c...
Xiujuan Chai, Laiyun Qing, Shiguang Shan, Xilin Ch...
136
Voted
AVBPA
2005
Springer
460views Biometrics» more  AVBPA 2005»
15 years 8 months ago
Fingerprint Quality Indices for Predicting Authentication Performance
The performance of an automatic fingerprint authentication system relies heavily on the quality of the captured fingerprint images. In this paper, two new quality indices for fi...
Yi Chen, Sarat C. Dass, Anil K. Jain
132
Voted
AVBPA
2005
Springer
226views Biometrics» more  AVBPA 2005»
15 years 8 months ago
Discriminant Analysis Based on Kernelized Decision Boundary for Face Recognition
A novel nonlinear discriminant analysis method, Kernelized Decision Boundary Analysis (KDBA), is proposed in our paper, whose Decision Boundary feature vectors are the normal vecto...
Baochang Zhang, Xilin Chen, Wen Gao
96
Voted
EMSOFT
2005
Springer
15 years 8 months ago
Centralized end-to-end flow control in a best-effort network-on-chip
Run-time communication management in a Network-on-Chip (NoC) is a challenging task. On one hand, the NoC needs to satisfy the communication requirements (e.g. throughput) of runni...
Prabhat Avasare, Vincent Nollet, Jean-Yves Mignole...