Sciweavers

508 search results - page 72 / 102
» RPC in the x-Kernel: Evaluating New Design Techniques
Sort
View
CRYPTO
2010
Springer
167views Cryptology» more  CRYPTO 2010»
15 years 27 days ago
Multiparty Computation for Dishonest Majority: From Passive to Active Security at Low Cost
Multiparty computation protocols have been known for more than twenty years now, but due to their lack of efficiency their use is still limited in real-world applications: the goal...
Ivan Damgård, Claudio Orlandi
CVPR
2010
IEEE
14 years 12 months ago
Anomaly detection in crowded scenes
A novel framework for anomaly detection in crowded scenes is presented. Three properties are identified as important for the design of a localized video representation suitable f...
Vijay Mahadevan, Weixin Li, Viral Bhalodia, Nuno V...
INFORMATICALT
2008
154views more  INFORMATICALT 2008»
14 years 11 months ago
A Novel Biometric Personal Verification System Based on the Combination of Palmprints and Faces
Abstract. This paper presents a bimodal biometric verification system based on the fusion of palmprint and face features at the matching-score level. The system combines a new appr...
Slobodan Ribaric, Ivan Fratric, Kristina Kis
IJAR
2010
153views more  IJAR 2010»
14 years 10 months ago
Diagnosis of dyslexia with low quality data with genetic fuzzy systems
For diagnosing dyslexia in early childhood, children have to solve non-writing based, graphical tests. Curently, these tests are processed by a human expert; applying artificial ...
Ana M. Palacios, Luciano Sánchez, Iné...
PAMI
2010
168views more  PAMI 2010»
14 years 10 months ago
Nonnegative Least-Correlated Component Analysis for Separation of Dependent Sources by Volume Maximization
—Although significant efforts have been made in developing nonnegative blind source separation techniques, accurate separation of positive yet dependent sources remains a challen...
Fa-Yu Wang, Chong-Yung Chi, Tsung-Han Chan, Yue Wa...