Sciweavers

1099 search results - page 184 / 220
» String Transformation Learning
Sort
View
106
Voted
FGR
2011
IEEE
255views Biometrics» more  FGR 2011»
14 years 4 months ago
Beyond simple features: A large-scale feature search approach to unconstrained face recognition
— Many modern computer vision algorithms are built atop of a set of low-level feature operators (such as SIFT [1], [2]; HOG [3], [4]; or LBP [5], [6]) that transform raw pixel va...
David D. Cox, Nicolas Pinto
107
Voted
ICCV
2011
IEEE
14 years 22 days ago
Hough-based Tracking of Non-Rigid Objects
Online learning has shown to be successful in tracking of previously unknown objects. However, most approaches are limited to a bounding-box representation with fixed aspect rati...
Martin Godec, Peter M. Roth, Horst Bischof
106
Voted
PKC
2009
Springer
166views Cryptology» more  PKC 2009»
16 years 1 months ago
Security of Blind Signatures under Aborts
We explore the security of blind signatures under aborts where the user or the signer may stop the interactive signature issue protocol prematurely. Several works on blind signatur...
Dominique Schröder, Marc Fischlin
EUROSYS
2008
ACM
15 years 9 months ago
Documenting and automating collateral evolutions in linux device drivers
The internal libraries of Linux are evolving rapidly, to address new requirements and improve performance. These evolutions, however, entail a massive problem of collateral evolut...
Yoann Padioleau, Julia L. Lawall, René Rydh...
106
Voted
ICMCS
1999
IEEE
126views Multimedia» more  ICMCS 1999»
15 years 5 months ago
Error Spreading: Reducing Bursty Errors in Continuous Media Streaming
With the growing popularity of the Internet, there is increasing interest in using it for audio and video transmission. Periodic network overloads, leading to bursty packet losses...
Hung Q. Ngo, Srivatsan Varadarajan, Jaideep Srivas...