Sciweavers

3072 search results - page 183 / 615
» Shape analysis algorithm based on information theory
Sort
View
ITCC
2005
IEEE
15 years 3 months ago
ASIC Implementation of a Unified Hardware Architecture for Non-Key Based Cryptographic Hash Primitives
Hash algorithms are a class of cryptographic primitives used for fulfilling the requirements of integrity and authentication in cryptography. In this paper, we propose and present...
T. S. Ganesh, T. S. B. Sudarshan
MICCAI
2008
Springer
15 years 11 months ago
Analysis of Surfaces Using Constrained Regression Models
We present a study of the relationship between the changes in the shape of the human ear due to jaw movement and acoustical feedback (AF) in hearing aids. In particular, we analyze...
Sune Darkner, Mert R. Sabuncu, Polina Golland, ...
SIBGRAPI
2009
IEEE
15 years 4 months ago
A Multi-linear Discriminant Analysis of 2D Frontal Face Images
We have designed and implemented a multi-linear discriminant method of constructing and quantifying statistically significant changes on human identity photographs. The method is...
Carlos E. Thomaz, Vagner do Amaral, Gilson Antonio...
90
Voted
DCOSS
2006
Springer
15 years 1 months ago
Efficient In-Network Processing Through Local Ad-Hoc Information Coalescence
We consider in-network processing via local message passing. The considered setting involves a set of sensors each of which can communicate with a subset of other sensors. There is...
Onur Savas, Murat Alanyali, Venkatesh Saligrama
83
Voted
SAC
1998
ACM
15 years 2 months ago
Scalability of an MPI-based fast messy genetic algorithm
The fast messy genetic algorithm (fmGA) belongs to a class of algorithms inspired by the principles of evolution, known appropriately as "evolutionary algorithms" (EAs)....
Laurence D. Merkle, George H. Gates Jr., Gary B. L...