Sciweavers

12052 search results - page 2194 / 2411
» computer 2010
Sort
View
90
Voted
ICPR
2010
IEEE
15 years 5 months ago
Detecting Altered Fingerprints
Abstract--The widespread deployment of Automated Fingerprint Identification Systems (AFIS) in law enforcement and border control applications has heightened the need for ensuring t...
Jianjiang Feng, Anil Jain, Arun Ross
84
Voted
TCS
2010
14 years 11 months ago
Invariant games
In the context of 2-player removal games, we define the notion of invariant game for which each allowed move is independent of the position it is played from. We present a family ...
Éric Duchêne, Michel Rigo
STOC
2010
ACM
168views Algorithms» more  STOC 2010»
15 years 10 months ago
Non-commutative circuits and the sum-of-squares problem
We initiate a direction for proving lower bounds on the size of non-commutative arithmetic circuits. This direction is based on a connection between lower bounds on the size of no...
Pavel Hrubes, Avi Wigderson and Amir Yehudayoff
109
Voted
ECCV
2010
Springer
15 years 5 months ago
Geometric Constraints for Human Detection in Aerial Imagery
In this paper, we propose a method for detecting humans in imagery taken from a UAV. This is a challenging problem due to small number of pixels on target, which makes it more diļ¬...
117
Voted
EUROSYS
2010
ACM
15 years 9 months ago
Splitter: A Proxy-based Approach for Post-Migration Testing of Web Applications
The benefits of virtualized IT environments, such as compute clouds, have drawn interested enterprises to migrate their applications onto new platforms to gain the advantages of ...
Xiaoning Ding, Hai Huang, Yaoping Ruan, Anees Shai...
« Prev « First page 2194 / 2411 Last » Next »