Sciweavers

4897 search results - page 914 / 980
» Trust Modeling for Peer-to-Peer Based Computing Systems
Sort
View
DRM
2003
Springer
15 years 5 months ago
Experiences with the enforcement of access rights extracted from ODRL-based digital contracts
In this paper, we present our experiences concerning the enforcement of access rights extracted from ODRL-based digital contracts. We introduce the generalized Contract Schema (Co...
Susanne Guth, Gustaf Neumann, Mark Strembeck
ECCV
2004
Springer
16 years 1 months ago
Transformation-Invariant Embedding for Image Analysis
Abstract. Dimensionality reduction is an essential aspect of visual processing. Traditionally, linear dimensionality reduction techniques such as principle components analysis have...
Ali Ghodsi, Jiayuan Huang, Dale Schuurmans
ICPR
2006
IEEE
16 years 29 days ago
Face Recognition Robust to Head Pose from One Sample Image
Most face recognition systems only work well under quite constrained environments. In particular, the illumination conditions, facial expressions and head pose must be tightly con...
Brian C. Lovell, Shaokang Chen, Ting Shan
WWW
2009
ACM
16 years 16 days ago
Bid optimization for broad match ad auctions
Ad auctions in sponsored search support"broad match"that allows an advertiser to target a large number of queries while bidding only on a limited number. While giving mo...
Eyal Even-Dar, Vahab S. Mirrokni, S. Muthukrishnan...
ECCV
2002
Springer
16 years 1 months ago
Eye Gaze Correction with Stereovision for Video-Teleconferencing
Abstract. The lack of eye contact in desktop video teleconferencing substantially reduces the effectiveness of video contents. While expensive and bulky hardware is available on th...
Ruigang Yang, Zhengyou Zhang