Sciweavers

5344 search results - page 916 / 1069
» Privacy-Preserving Set Operations
Sort
View
142
Voted
ICB
2007
Springer
683views Biometrics» more  ICB 2007»
15 years 9 months ago
Face Detection Based on Multi-Block LBP Representation
Effective and real-time face detection has been made possible by using the method of rectangle Haar-like features with AdaBoost learning since Viola and Jones’ work [12]. In this...
Lun Zhang, Rufeng Chu, Shiming Xiang, ShengCai Lia...
IFIP
2007
Springer
15 years 9 months ago
Capable Leader and Skilled and Motivated Team Practices to Introduce eXtreme Programming
Abstract. Applying changes to software engineering processes in organisations usually raises many problems of varying nature. Basing on a real-world 2-year project and a simultaneo...
Lech Madeyski, Wojciech Biela
TCC
2007
Springer
104views Cryptology» more  TCC 2007»
15 years 9 months ago
Unifying Classical and Quantum Key Distillation
Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantum) systems prepared jointly according to a tripartite state ρABE. In addition, ...
Matthias Christandl, Artur Ekert, Michal Horodecki...
131
Voted
GMP
2006
IEEE
127views Solid Modeling» more  GMP 2006»
15 years 9 months ago
Finding All Undercut-Free Parting Directions for Extrusions
For molding and casting processes, geometries that have undercut-free parting directions (UFPDs) are preferred for manufacturing. Identifying all UFPDs for arbitrary geometries at ...
Xiaorui Chen, Sara McMains
121
Voted
ICDCS
2006
IEEE
15 years 9 months ago
SysProf: Online Distributed Behavior Diagnosis through Fine-grain System Monitoring
Runtime monitoring is key to the effective management of enterprise and high performance applications. To deal with the complex behaviors of today’s multi-tier applications runn...
Sandip Agarwala, Karsten Schwan