Sciweavers

881 search results - page 112 / 177
» Secure Personal Data Servers: a Vision Paper
Sort
View
ICPR
2008
IEEE
15 years 8 months ago
Score based biometric template selection
A biometric identification procedure usually contains two stages: registration and authentication. Most biometric systems capture multiple samples of the same biometric trait (e.g...
Yong Li, Jianping Yin, En Zhu, Chunfeng Hu, Hui Ch...
182
Voted
ECCV
2008
Springer
15 years 3 months ago
Multiple Instance Boost Using Graph Embedding Based Decision Stump for Pedestrian Detection
Pedestrian detection in still image should handle the large appearance and stance variations arising from the articulated structure, various clothing of human as well as viewpoints...
Junbiao Pang, Qingming Huang, Shuqiang Jiang
126
Voted
ICPR
2010
IEEE
15 years 2 months ago
Semi-blind Speech-Music Separation Using Sparsity and Continuity Priors
—In this paper we propose an approach for the problem of single channel source separation of speech and music signals. Our approach is based on representing each source’s power...
Hakan Erdogan, Emad M. Grais
125
Voted
OOPSLA
2004
Springer
15 years 7 months ago
Resolving feature convolution in middleware systems
Middleware provides simplicity and uniformity for the development of distributed applications. However, the modularity of the architecture of middleware is starting to disintegrat...
Charles Zhang, Hans-Arno Jacobsen
94
Voted
IMC
2006
ACM
15 years 7 months ago
A study of malware in peer-to-peer networks
Peer-to-peer (P2P) networks continue to be popular means of trading content. However, very little protection is in place to make sure that the files exchanged in these networks a...
Andrew J. Kalafut, Abhinav Acharya, Minaxi Gupta