Sciweavers

1202 search results - page 161 / 241
» Robust system multiangulation using subspace methods
Sort
View
KDD
2007
ACM
154views Data Mining» more  KDD 2007»
15 years 10 months ago
Canonicalization of database records using adaptive similarity measures
It is becoming increasingly common to construct databases from information automatically culled from many heterogeneous sources. For example, a research publication database can b...
Aron Culotta, Michael L. Wick, Robert Hall, Matthe...
ICASSP
2007
IEEE
15 years 4 months ago
Boosted Binary Audio Fingerprint Based on Spectral Subband Moments
An audio fingerprinting system identifies an audio based on a unique feature vector called the audio fingerprint. The performance of an audio fingerprinting system is directly...
Sungwoong Kim, Chang D. Yoo
PLDI
2009
ACM
15 years 4 months ago
A weakest precondition approach to active attacks analysis
Information flow controls can be used to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted envi...
Musard Balliu, Isabella Mastroeni
HICSS
2007
IEEE
109views Biometrics» more  HICSS 2007»
15 years 4 months ago
Towards Reliable Computation of Large-Scale Market-Based Optimal Power Flow
The deregulated electricity market calls for robust OPF tools that can provide (a) deterministic convergence, (b) accurate computation of a variety of nodal prices, (c) support of...
Hongye Wang, Robert J. Thomas
CVIU
2011
14 years 1 months ago
Markerless reconstruction and synthesis of dynamic facial expressions
In this paper we combine methods from the field of computer vision with surface editing techniques to generate animated faces, which are all in full correspondence to each other....
Dominik Sibbing, Martin Habbecke, Leif Kobbelt