Sciweavers

833 search results - page 83 / 167
» Wallet Databases with Observers
Sort
View
133
Voted
AINA
2010
IEEE
15 years 7 months ago
Empirical Analysis of Attackers Activity on Multi-tier Web Systems
—Web-based systems commonly face unique set of vulnerabilities and security threats due to their high exposure, access by browsers, and integration with databases. In this paper ...
Katerina Goseva-Popstojanova, Brandon Miller, Rist...
123
Voted
AMDO
2006
Springer
15 years 7 months ago
Ballistic Hand Movements
Common movements like reaching, striking, etc. observed during surveillance have highly variable target locations. This puts appearance-based techniques at a disadvantage for model...
Shiv Naga Prasad Vitaladevuni, Vili Kellokumpu, La...
145
Voted
FGR
2004
IEEE
238views Biometrics» more  FGR 2004»
15 years 7 months ago
Nearest Manifold Approach for Face Recognition
Faces under varying illumination, pose and non-rigid deformation are empirically thought of as a highly nonlinear manifold in the observation space. How to discover intrinsic low-...
Junping Zhang, Stan Z. Li, Jue Wang
128
Voted
ICPR
2010
IEEE
15 years 7 months ago
Modeling Facial Skin Motion Properties in Video and Its Application to Matching Faces across Expressions
—In this paper, we propose a method to model the material constants (Young’s modulus) of the skin in subregions of the face from the motion observed in multiple facial expressi...
Vasant Manohar, Matthew Shreve, Dmitry Goldgof, Su...
118
Voted
AAAI
2007
15 years 6 months ago
A Kernel Approach to Comparing Distributions
We describe a technique for comparing distributions without the need for density estimation as an intermediate step. Our approach relies on mapping the distributions into a Reprod...
Arthur Gretton, Karsten M. Borgwardt, Malte J. Ras...