Sciweavers

8381 search results - page 1621 / 1677
» The security of machine learning
Sort
View
108
Voted
IACR
2011
88views more  IACR 2011»
13 years 9 months ago
Storing Secrets on Continually Leaky Devices
We consider the question of how to store a value secretly on devices that continually leak information about their internal state to an external attacker. If the secret value is s...
Yevgeniy Dodis, Allison B. Lewko, Brent Waters, Da...
118
Voted
CVPR
2009
IEEE
16 years 5 months ago
Echocardiogram View Classification using Edge Filtered Scale-invariant Motion Features
In an 2D echocardiogram exam, an ultrasound probe samples the heart with 2D slices. Changing the orientation and position on the probe changes the slice viewpoint, altering the ...
Ritwik Kumar, Fei Wang, David Beymer, Tanveer Fath...
ICCV
2009
IEEE
1363views Computer Vision» more  ICCV 2009»
16 years 3 months ago
Human Detection Using Partial Least Squares Analysis
Significant research has been devoted to detecting people in images and videos. In this paper we describe a human detection method that augments widely used edge-based features ...
William Robson Schwartz, Aniruddha Kembhavi, David...
CVPR
2007
IEEE
16 years 6 days ago
Robust Click-Point Linking: Matching Visually Dissimilar Local Regions
This paper presents robust click-point linking: a novel localized registration framework that allows users to interactively prescribe where the accuracy has to be high. By emphasi...
Kazunori Okada, Xiaolei Huang
104
Voted
CVPR
2008
IEEE
16 years 6 days ago
Small codes and large image databases for recognition
The Internet contains billions of images, freely available online. Methods for efficiently searching this incredibly rich resource are vital for a large number of applications. Th...
Antonio B. Torralba, Robert Fergus, Yair Weiss
« Prev « First page 1621 / 1677 Last » Next »