Sciweavers

3116 search results - page 233 / 624
» Recovering
Sort
View
FGR
2004
IEEE
167views Biometrics» more  FGR 2004»
15 years 4 months ago
Eigen-Harmonics Faces: Face Recognition under Generic Lighting
The performances of face recognition systems are heavily subject to the variations in lighting. We propose a novel approach for face recognition under generic illumination conditi...
Laiyun Qing, Shiguang Shan, Wen Gao
94
Voted
ECAI
2006
Springer
15 years 4 months ago
Situation Assessment for Sensor-Based Recovery Planning
We present an approach for recovery from perceptual failures, or more precisely anchoring failures. Anchoring is the problem of connecting symbols representing objects to sensor da...
Abdelbaki Bouguerra, Lars Karlsson, Alessandro Saf...
ER
2006
Springer
132views Database» more  ER 2006»
15 years 4 months ago
Schema-Mediated Exchange of Temporal XML Data
When web servers publish data formatted in XML, only the current state of the data is (generally) published. But data evolves over time as it is updated. Capturing that evolution i...
Curtis E. Dyreson, Richard T. Snodgrass, Faiz Curr...
ESA
2006
Springer
92views Algorithms» more  ESA 2006»
15 years 4 months ago
Out-of-Order Event Processing in Kinetic Data Structures
We study the problem of designing kinetic data structures (KDS's for short) when event times cannot be computed exactly and events may be processed in a wrong order. In tradi...
Mohammad Ali Abam, Pankaj K. Agarwal, Mark de Berg...
105
Voted
FSE
2006
Springer
109views Cryptology» more  FSE 2006»
15 years 4 months ago
Computing the Algebraic Immunity Efficiently
The purpose of algebraic attacks on stream and block ciphers is to recover the secret key by solving an overdefined system of multivariate algebraic equations. They become very eff...
Frédéric Didier, Jean-Pierre Tillich