Support Vector Machines for Face Authentication
|
|
- Dwain Simpson
- 5 years ago
- Views:
Transcription
1 Suort Vector Machines for Face Authentication K Jonsson 1 2, J Kittler 1,YPLi 1 and J Matas CVSSP, University of Surrey Guildford, Surrey GU2 5XH, United Kingdom 2 CMP, Czech Technical University Prague, Czech Reublic Abstract The aer studies Suort Vector Machines (SVMs) in the context of face authentication. Our study suorts the hyothesis that the SVM aroach is able to extract the relevant discriminatory information from the training data. We believe this is the main reason for its suerior erformance over benchmark methods. When the reresentation sace already catures and emhasises the discriminatory information content as in the case of Fisherfaces, SVMs loose their sueriority. SVMs can also coe with illumination changes, rovided these are adequately reresented in the training data. However, on data which has been sanitised by feature extraction (Fisherfaces) and/or normalisation, SVMs can get over-trained, resulting in the loss of the ability to generalise. SVMs involve many arameters and can emloy different kernels. This makes the otimisation sace rather extensive, without the guarantee that it has been fully exlored to find the best solution. 1 Introduction Verification of erson identity based on biometric information is imortant for many security alications. Examles include access control to buildings, surveillance and intrusion detection. Furthermore, there are many emerging fields that would benefit from develoments in erson verification technology such as advanced human-comuter interfaces and tele-services including tele-shoing and tele-banking. Comaring verification to recognition there are several asects which differ. First, a client an authorised user of a ersonal identification system is assumed to be co-oerative and makes an identity claim. Comutationally this means that it is not necessary to consult the comlete set of database images (denoted model images below) in order to verify a claim. An incoming image (referred to as a robe image) is thus comared to a small number of model images of the erson whose identity is claimed and not, as in the recognition scenario, with every image (or some descritor of an image) in a otentially large database. Second, an automatic authentication system must oerate in near-real time to be accetable to users. Finally, in recognition exeriments, only images of eole from the training database are resented to the system, whereas the case of an imoster (most likely a reviously unseen erson) is of utmost imortance for authentication. 543 BMVC 1999 doi: /c.13.54
2 The field of face recognition is well established and a large number of algorithms have been roosed in the literature. Poular aroaches include the ones based on deformable temlates [10], dynamic link matching [4], and Eigenfaces [9]. These techniques vary in comlexity and erformance and the choice of algorithm is tyically deendent on the secific alication. The verification roblem, on the other hand, is less exlored. Recent examles include [3] in which a robust form of correlation is alied to face authentication. The aim of the aer is to evaluate the effectiveness of the SVM aroach to face authentication. An earlier study of SVMs in face verification has been reorted by Phillis [8]. An SVM verification system design was comared with a standard Princial Comonent Analysis (PCA) face authentication method and the former was found to be significantly better. In this aroach the SVM was trained to distinguish between the oulations of within-client and between-client difference images resectively, as originally roosed by Moghaddam [7]. This method gives client non-secific suort vectors. In our aroach we adot a client-secific solution which requires learning clientsecific suort vectors. However, this is not the main distinguishing feature of our work: it only reflects our focus on authentication as oosed to recognition which is of concern in [8]. Our rimary motivation for carrying out a similar study was to establish why the erformance of the SVM aroach is suerior. We want to investigate the inherent otential of SVMs to extract the relevant discriminatory information from the training data irresective of reresentation and rerocessing. In order to achieve this objective we have designed exeriments in which faces are reresented in both Princial Comonent (PC) and Linear Discriminant (LD) subsaces. The latter basis (Fisherfaces) is used as an examle of a face reresentation with focus on discriminatory feature extraction while the former achieves simly data comression. We also study the effect of image hotometric normalisation on the erformance of the SVM method. A number of criteria have been considered as a basis for the SVM aroach evaluation, using other baseline techniques as a benchmark. We have included as benchmark verification methods not only the classical PC variants with the L 2 norm and correlation coefficient resectively, but also the LD sace with the same two decision schemes. As criteria for evaluating SVMs in relation to the benchmark methods we have concentrated on the following: comutational comlexity (training mode and routine verification mode), robustness (sensitivity to inut data conditioning), ability to extract discriminatory information, the merits of nonlinear boundaries. The last three criteria are exressed quantitatively in terms of the false client rejection and imostor accetance rates. The findings of our study strongly suort the hyothesis that the SVM aroach is owerful in the sense of being able to extract the relevant discriminatory information from the training data. This is the main reason for the large difference between the observed erformance of the classical Eigenface classification methods and SVMs (factor of almost 3). When the reresentation sace already catures and emhasises the discriminatory information content as in the case of LD bases, SVMs cease to be suerior to the simle Euclidean distance or correlation decision rules. SVMs also show a suerior caability to coe with illumination changes, rovided these are adequately reresented in the training data. However, on data which has been sanitised by feature extraction (Fisherfaces) and/or normalisation, SVMs can get overtrained, resulting in the loss of the ability to generalise. SVMs involve many arameters and can emloy different kernels. This makes the otimisation sace rather extensive, 544
3 without the guarantee that it has been fully exlored to find the best solution. The aer is organised as follows. In the next section we introduce the two face reresentation saces used in our study, namely Eigenfaces and Fisherfaces. In Section 2 we overview the SVM aroach to face identity verification and summarise the benchmark classification methods. Section 3 introduces the face database used in exerimentation and describes the exeriments carried out, their objectives and the results obtained. The results are discussed in Section 4 and conclusions are drawn in Section 5. 2 Face Authentication Any authentication rocess involves two basic comutational stages. In the first stage a suitable reresentation is derived with the multile objective of making the subsequent, decision-making stage, comutationally feasible, immune to environmental changes during the biometric data acquisition, and effective by roviding it only with information which is ertinent to the authentication task. The urose of the second stage is to accet or reject the identity claim corresonding to a robe biometric measurement. This is basically a two-class attern recognition roblem. In the following subsections we introduce the methods adoted for the design of each of these two stages in the context of the face authentication study ursued in this aer. 2.1 Reresentation of Faces The first ste in the face reresentation rocess involves image re-rocessing in order to establish corresondence between face images to be comared. Once an image is registered, it can further be normalised hotometrically. In our study we set out to investigate the resilience of different decision making methods to varying illumination and thus this ste was alied only in a subset of exeriments. In the final ste of rocessing, the image is rojected into a coordinate system which facilitates the decision making rocess comutationally and ossibly emhasises the imortant attributes for face verification. Geometric Normalisation. As the focus of the aer is on the decision making asects of face authentication we have tried to eliminate the deendency of our exeriments on rocesses which may lack robustness. For this reason we have erformed face registration semi-automatically. The rocedure is based on manually localised eye ositions. Four arameters comuted from the eye coordinates (rotation, scaling and translation in the horisontal and vertical directions) are used to cro the face art from the original image and scale it to any desired resolution. Photometric Normalisation. When alied, the hotometric normalisation consisted of removing the mean of the geometrically normalised image and scaling the ixel values by their standard deviation, estimated over the whole croed image. Image Projection. Suose that we have c clients and M training face images x i i = 1 ::: M, x i 2 R D each belonging to one of the client classes fc1 C2 ::: C c g.then we can define the following second-order statistics: 545
4 Between-class scatter matrix: cx S B = 1 ( k ; )( k ; ) T (1) c k=1 Within-class scatter matrix: S W = 1 M cx X (x i ; k )(x i ; k ) k=1 ijx i2ck T (2) Total scatter matrix: S T = S W + S B (3) where is the grand mean and k is the mean of class C k. The aim of the Princial Comonent Analysis is to identify the subsace of the image sace sanned by the training face image data and to decorrelate the ixel values. This can be achieved by finding the eigenvectors W ca of matrix S T associated with nonzero eigenvalues by solving S T W ca ; W ca =0 (4) These eigenvectors are referred to as Eigenfaces. The classical reresentation of a face image is obtained by rojecting it to the coordinate system defined by the Eigenfaces. The rojection of face images into the Princial Comonent (Eigenface) subsace achieves information comression, decorrelation and dimensionality reduction to facilitate decision making. If one is also interested in identifying imortant attributes (features) for face authentication, one can adot a feature extraction maing. A oular technique is to find the Fisher linear discriminants (Fisherfaces) by solving S B W lda ; S W W lda =0 (5) The rojection of a face image into the system of Fisherfaces associated with nonzero eigenvalues will yield a reresentation which will emhasise the discriminatory content of the image. The solution of the generalised eigenvalue roblem in Equation 5 is known, but due to the high dimensionality many standard methods fail and the choice of a stable numerical algorithm is non-trivial [5]. Figure 1 shows the first few PC and LD basis images. In Section 3, we erform exeriments with different number of basis vectors taken from either the Eigenface or Fisherface systems. In the following, for the sake of notational simlicity, we shall not distinguish between the two different basis systems, nor shall we exlicitly denote the dimensionality of the reresentation sace. The actual reresentation used will be clear from the exeriment descrition. Thus in general, in each exeriment we shall work with some transformation matrix W. A samle face image y will then be reresented by a rojection x obtained as x = W T y. Similarly, the client model k will be rojected into a vector! k in the aroriate reresentation sace. 2.2 Classification Suort Vector Machines. The main decision making tool investigated in this aer is the Suort Vector Machine. Below we give a brief resentation of the basic theory. The 546
5 (a) Fisherfaces, unnormalised data (b) Eigenfaces, unnormalised data (c) Eigenfaces, normalised data Figure 1: Basis vectors: Subsace comuted using (a) LDA (unnormalised data) and (b c) PCA (unnormalised and normalised data). In all three cases, the first six basis vectors are shown. reader is referred to [1] for a more comrehensive introduction. SVMs are based on the rincile of structural risk minimisation. The aim is to minimise the uer bound on the exected (or actual) risk defined as 1 Z 1 R() = jz ; f (x )jdp (x z) (6) 2 where is a set of arameters defining the trained machine, z a class label associated with a training samle x, f (x ) a function roviding a maing from training samles to class labels, and P (x z) the unknown robability distribution associating a class label with each training samle. Let l denote the number of training samles and choose some such that 0 1. Then, with robability 1 ;, the following bound on the exected risk holds: r h(log(2l=h) +1); log(=4) R() R em () + (7) l where R em () is the emirical risk as measured on the training set and h is the so called Vanik Chervonenkis (VC) dimension. The second term on the right hand side is called the VC confidence. There are two strategies for minimising the uer bound. The first one is to kee the VC confidence fixed and to minimise the emirical risk and the second one to fix the emirical risk (to a small value) and minimise the VC confidence. The latter aroach is the basis for SVMs and below we will briefly outline this rocedure. First consider the linear searable case. We are looking for the otimal hyerlane in the set of hyerlanes searating the given training samles. This hyerlane minimises the VC confidence and rovides the best generalisation caabilities. Giving a geometric 1 The notation is similar to the one in [1]. 547
6 interretation, the otimal hyerlane maximises the sum of the distances to the closest ositive and negative training samles. This sum is called the margin of the searating hyerlane. It can be shown that the otimal hyerlane w x+b =0(where w is normal to the hyerlane) is obtained by minimising kwk 2 subject to a set of constraints. This is a quadratic otimisation roblem. These concets can be extended to the non-searable and non-linear case. The searability roblem is solved by adding a term to the exression subject to minimisation. This term is the sum of the deviations of the non-searable training samles from the boundary of the margin. This sum is weighted using a arameter controlling the cost of misclassification. The second roblem is how to handle non-linear decision boundaries. This is solved by maing the training samles to a high-dimensional feature sace using kernel functions. In this sace the decision boundary is linear and the techniques outlined above can be directly alied. The kernel functions used in the exeriments reorted in Section 3 are linear, olynomial and radial basis functions (RBFs) defined as K(x i x j ) = x i x j (8) K(x i x j ) = (x i x j +1) d (9) K(x i x j ) = e ;kxi;xjk2 (10) where x i and x j denote two samles. The user-controlled arameters are the degree d in the case of the olynomial and the -value in the case of the RBF kernel. In addition to the SVMs with different kernels we have also imlemented the following standard classification rules as baselines for exerimental comarison. Euclidean Distance. The most commonly used decision rule is based on the Euclidean distance between the samle rojection x and the rojection of the k-th client mean! k, i.e. q d E (x! k )= (x ;! k ) T (x ;! k ) (11) The claimed client identity is acceted if d E (x! k ) is below a threshold Ek. Otherwise it is rejected. Normalised Correlation. Alternatively, the decision can be based on the correlation score d C (x! k )= jxt! k j (12) jxjj! k j In the case of the correlation measure the claimed identity is acceted if d C (x! k ) exceeds a re-secified threshold Ck. Client-Secific Thresholding. The client-secific threshold k can be determined from the receiver oerating characteristic (ROC) comuted on an indeendent evaluation set. The rocedure amounts to generating ROC curves arametrised by secific ercentiles of the imoster distance distributions. Each ercentile defines client-secific offsets. The ROC curves are roduced by measuring the false rejection and false accetance rates for different distance increments measured from these offsets. The ROC curve yielding the minimum equal error rate and the actual increment giving this error jointly define the client secific thresholds. 548
7 3 Exerimental Results BMVC99 The exeriments summarised below were all erformed on frontal-face images from the extended M2VTS multi-modal database [6]. This ublicly available database contains face images and seech recordings of 295 ersons. The subjects were recorded in four searate sessions uniformly distributed over a eriod of 5 months, and within each session a number of shots were taken including both frontal-view and rotation sequences. In the frontal-view sequences the subjects read a secific text (roviding synchronised image and seech data), and in the rotation sequences the head was moved vertically and horizontally (roviding information useful for 3D surface modelling of the head). The exeriments were conducted according to the Laussane evaluation rotocol [6]. This rotocol rovides a unified framework within which the erformance of vision- and seech-based erson authentication systems running on the extended M2VTS database can be measured. The rotocol secifies a artitioning of the database into three disjoint sets: a training set (200 clients), an evaluation set (200 clients and 25 imostors) and a test set (200 clients and 70 imostors). The training set is used to build client models, the evaluation set to get distributions of client and imostor scores used to establish verification thresholds, and the test set to obtain a reliable estimate of the verification rate on indeendent data. 3.1 Results on Face Authentication Exeriments were erformed for the two different reresentations with and without face normalisation, giving four results for each authentication method. The results are summarised in Table 1. Let us first of all look at the baseline methods. One can see that the erformance of both the Euclidean distance and the correlation classifiers imroves monotonically with the data quality (PCs without normalisation, PCs with normalisation, LD without normalisation, LD with normalisation). The Euclidean distance is articularly sensitive to the deviations from the imlicit model underlying the aroach, i.e. client clusters being very comact and roughly sherical. The correlation coefficient can coe better with deviations from the shericity. However, once the data is of that form as in the case of the LD bases with normalised data, the inherent flexibility of this classification method results in a slightly worse erformance than that achieved by the Euclidean distance classifier. The verification erformance as a function of subsace dimensionality for the PCA subsaces using SVMs as classification scheme is shown in Table 2. For both subsaces (unnormalised and normalised), the total error rate dros when the number of coefficients is increased. However, when a certain oint is reached (about 200 coefficients ) the erformance saturates and there is no further imrovement of the verification rates. This series of exeriments shows that the SVMs are robust to changes in the quality of the reresentation and erform well on both under-reresented data (low number of coefficients) and when noise is resent (high number of coefficients). A somewhat surrising result of the exeriments is that the SVMs tend to erform better for lower data quality. In fact Table 1 shows that the erformance is almost without excetion inversely related to data quality. The best results have been obtained for PCs without face normalisation and the worst results for LDs with face normalisation when the authentication roblem becomes relatively easy. This suggests that SVMs can be over- 549
8 SSP CLM NOR KRN PAR Evaluation set Test set EER TE FR FA TE PCA EUD N/A N/A NOC N/A N/A SVM LIN N/A ? EUD NOC SVM POL RBF N/A N/A N/A N/A LIN N/A POL RBF RBF SSP CLM NOR KRN PAR Evaluation set Test set EER TE FR FA TE LDA EUD N/A N/A NOC N/A N/A SVM LIN N/A EUD NOC SVM BMVC99 POL RBF N/A N/A N/A N/A LIN N/A POL RBF Table 1: Verification erformance on the extended M2VTS database: False rejection (FR), false accetance (FA) and total error rate (TE) as functions of subsace (SSP, uer table PCA, lower table LDA), classification method (CLM), hotometric normalisation (NOR) and kernel (KRN, if alicable). The classification methods are Euclidean distance (EUD), normalised correlation (NOC) and suort vector machines (SVM). The kernels are linear (LIN), olynomial (POL) and radial basis functions (RBF). The kernel arameters (PAR) are indicated when alicable (degree for olynomial and for RBF). The row marked with a? was obtained using a different subsace (see text). SSP NoC ERG Evaluation set Test set EER TE FR FA TE UN NO Table 2: Verification erformance as function of PCA subsace dimensionality: False rejection (FR), false accetance (FA) and total error rate (TE) as functions of subsace (SSP) and number of rojection coefficients (NoC). The two subsaces were obtained from unnormalised (UN) and normalised (NO) data. The corresonding ercentage of the energy (ERG) in the subsace is also indicated. All results were obtained using RBF kernel ( =0:01). 550
9 trained on relatively easy data and cannot generalise to new data so readily. This finding has been confirmed by another exeriment where the PC basis system was comuted for normalised face data but without removing the global face mean (row marked with?). In this case the first Eigenface is comletely determined by this global mean face and the successive Eigenfaces are influenced accordingly. For this system of PCs the test set erformance of 5.75% is comarable to the best achieved with the Euclidean distance decision rule (5.68%). The following conclusions can be drawn from the study: The SVM aroach is able to extract the relevant discriminatory information from the data fully automatically. It can also coe with illumination changes. The major role in this characteristic is layed by the SVMs ability to learn non-linear decision boundaries. On data which has been sanitised by feature extraction (Fisherfaces) and/or normalisation, SVMs can get over-trained, resulting in the loss of the ability to generalise. SVMs involve many arameters and can emloy different kernels. This makes the otimisation sace rather extensive, without the guarantee that it has been fully exlored to find the best solution. An SVM takes about 5 seconds to train er client (on a Sun Ultra Enterrise 450). This is about an order of magnitude longer than determining client-secific thresholds for the Euclidean and correlation coefficient classifiers. However, from the ractical oint of view the difference is insignificant. 4 Discussion It is interesting to note that the total error rates achieved on the evaluation set by all the SVM methods are very similar. The better results on the test set yielded by some of the techniques suggest that the test set data is easier than the evaluation set data. The differences in the test set erformance are erhas indicative of the different generalisation caabilities of the resective methods. While it is true that the SVMs are designed not to over-train, if the reresentation sace used is excessively tuned to the training data already, the SVM cannot mitigate such an inherent roblem. This could exlain the better test set erformance on a less owerful reresentation afforded in terms of the PC sace. Note also the difference in the information used by the various decision making schemes which can be gleaned from Figure 2. In this figure we show the original of a robe image, its PC reconstruction in Figure 2b, its LD reconstruction in Figure 2c and finally its SVM reconstruction in Figure 2d. The latter two reconstructions have been roduced in an analogical way to the PC reconstruction aroach. The classical Euclidean distance and correlation methods use the standard PCA reconstruction of the robe image shown in Figure 2b. The SVM using the PC coefficients work with a similar source of information but some regions in the image are weighted more heavily. Thus, SVMs seem to be caable of erforming client-deendent feature extraction. The Fisherface reconstruction uses the global mean image as a starting oint. The bright areas indicate the increased weighting alied to some ixels in the image. This weighting is client deendent and is a function of the robe image rojection into the Fisher sace. 551
10 (a) (b) (c) (d) Figure 2: Reconstruction from subsace reresentations: (a) original image, reconstruction using (b) PCA (191 coefficients), (c) LDA (199 coefficients) and (d) SVM (37 coefficients) subsaces. All subsaces were obtained from unnormalised data. 5 Conclusions The aer studied SVMs in the context of face authentication. Our study roved the hyothesis that the SVM aroach is able to extract the relevant discriminatory information from the training data. This is the main reason for the large difference between the observed erformance of the classical Eigenface classification methods used as a benchmark and SVMs (factor of almost 3). When the reresentation sace already catures and emhasises the discriminatory information content as in the case of LD bases, SVMs cease to be suerior to the simle Euclidean distance or correlation decision rules. SVMs also show a suerior caability to coe with illumination changes, rovided these are adequately reresented in the training data. However, on data which has been sanitised by feature extraction (Fisherfaces) and/or normalisation, SVMs can get overtrained, resulting in the loss of the ability to generalise. SVMs involve many arameters and can emloy different kernels. This makes the otimisation sace rather extensive, without the guarantee that it has been fully exlored to find the best solution. Acknowledgements The research reorted in this aer was carried out within the framework of the Euroean Union ACTS roject M2VTS and ESPRIT RETINA. We would also like to acknowledge Thorsten Joachims at the University of Dortmund for making the SVM Light rogram [2] available to the research community. References [1] C. J. C. Burges. A tutorial on suort vector machines for attern recognition. Data Mining and Knowledge Discovery, 2(2): , [2] T. Joachims. Making large-scale SVM learning ractical. In B. Schölkof, C. J. C. Burges, and A. J. Smola, editors, Advances in Kernel Methods: Suort Vector Learning, ages 41 56, Cambridge, USA, MIT Press. 552
11 [3] K. Jonsson, J. Matas, and J. Kittler. Learning salient features for real-time face verification. In S. Akunuri and C. Kullman, editors, Audio- and Video-Based Biometric Person Authentication, Washington D. C., March 1999, ages 60 65, [4] M. Lades, J. C. Vorbrüggen, J. Buhmann, J. Lange, C. v.d. Malsburg, R. P. Würtz, and W. Konen. Distortion invariant object recognition in the dynamic link architecture. IEEE Transactions on Comuters, 42(3): , Mar [5] Y P Li, J Kittler, and J Matas. Effective imlementation of linear discriminant analysis for face recognition and verification. In A. Leonardis and F. Solina, editors, Comuter Analysis of Images and Patterns, Ljubljana, Slovenia, Set, to aear. [6] K. Messer, J. Matas, J. Kittler, J. Luettin, and G. Maitre. XM2VTSDB: The extended M2VTS database. In S. Akunuri and C. Kullman, editors, Audio- and Video- Based Biometric Person Authentication, Washington D. C., March 1999, ages 72 77, [7] B. Moghaddam, W. Wahid, and A. Pentland. Beyond eigenfaces: Probabilistic matching for face recognition. In Automatic Face and Gesture Recognition, Nara, Jaan, Aril 1998, ages 30 35, [8] P. J. Phillis. Suort vector machines alied to face recognition. In M. S. Kearns, S. A. Solla, and D. A. Cohn, editors, Advances in Neural Information Processing Systems 11, [9] M. A. Turk and A. P. Pentland. Eigenfaces for recognition. Journal of Cognitive Neuroscience, 3(1):71 86, [10] A. L. Yuille. Deformable temlates for face recognition. Journal of Cognitive Neuroscience, 3(1):59 70,
Face Recognition Using Legendre Moments
Face Recognition Using Legendre Moments Dr.S.Annadurai 1 A.Saradha Professor & Head of CSE & IT Research scholar in CSE Government College of Technology, Government College of Technology, Coimbatore, Tamilnadu,
More informationA Novel Iris Segmentation Method for Hand-Held Capture Device
A Novel Iris Segmentation Method for Hand-Held Cature Device XiaoFu He and PengFei Shi Institute of Image Processing and Pattern Recognition, Shanghai Jiao Tong University, Shanghai 200030, China {xfhe,
More informationSingle character type identification
Single character tye identification Yefeng Zheng*, Changsong Liu, Xiaoqing Ding Deartment of Electronic Engineering, Tsinghua University Beijing 100084, P.R. China ABSTRACT Different character recognition
More informationSensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network
1 Sensitivity Analysis for an Otimal Routing Policy in an Ad Hoc Wireless Network Tara Javidi and Demosthenis Teneketzis Deartment of Electrical Engineering and Comuter Science University of Michigan Ann
More informationWavelet Based Statistical Adapted Local Binary Patterns for Recognizing Avatar Faces
Wavelet Based Statistical Adated Local Binary atterns for Recognizing Avatar Faces Abdallah A. Mohamed 1, 2 and Roman V. Yamolskiy 1 1 Comuter Engineering and Comuter Science, University of Louisville,
More informationLearning Robust Locality Preserving Projection via p-order Minimization
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence Learning Robust Locality Preserving Projection via -Order Minimization Hua Wang, Feiing Nie, Heng Huang Deartment of Electrical
More informationDetection of Occluded Face Image using Mean Based Weight Matrix and Support Vector Machine
Journal of Comuter Science 8 (7): 1184-1190, 2012 ISSN 1549-3636 2012 Science Publications Detection of Occluded Face Image using Mean Based Weight Matrix and Suort Vector Machine 1 G. Nirmala Priya and
More informationRandomized algorithms: Two examples and Yao s Minimax Principle
Randomized algorithms: Two examles and Yao s Minimax Princile Maximum Satisfiability Consider the roblem Maximum Satisfiability (MAX-SAT). Bring your knowledge u-to-date on the Satisfiability roblem. Maximum
More informationAn Efficient Coding Method for Coding Region-of-Interest Locations in AVS2
An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 Mingliang Chen 1, Weiyao Lin 1*, Xiaozhen Zheng 2 1 Deartment of Electronic Engineering, Shanghai Jiao Tong University, China
More informationA DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans
Available online at htt://ijdea.srbiau.ac.ir Int. J. Data Enveloment Analysis (ISSN 2345-458X) Vol.5, No.2, Year 2017 Article ID IJDEA-00422, 12 ages Research Article International Journal of Data Enveloment
More informationLearning Motion Patterns in Crowded Scenes Using Motion Flow Field
Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Min Hu, Saad Ali and Mubarak Shah Comuter Vision Lab, University of Central Florida {mhu,sali,shah}@eecs.ucf.edu Abstract Learning tyical
More informationStereo Disparity Estimation in Moment Space
Stereo Disarity Estimation in oment Sace Angeline Pang Faculty of Information Technology, ultimedia University, 63 Cyberjaya, alaysia. angeline.ang@mmu.edu.my R. ukundan Deartment of Comuter Science, University
More informationImproved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties
Imroved heuristics for the single machine scheduling roblem with linear early and quadratic tardy enalties Jorge M. S. Valente* LIAAD INESC Porto LA, Faculdade de Economia, Universidade do Porto Postal
More informationCMSC 425: Lecture 16 Motion Planning: Basic Concepts
: Lecture 16 Motion lanning: Basic Concets eading: Today s material comes from various sources, including AI Game rogramming Wisdom 2 by S. abin and lanning Algorithms by S. M. LaValle (Chats. 4 and 5).
More informationA Study of Protocols for Low-Latency Video Transport over the Internet
A Study of Protocols for Low-Latency Video Transort over the Internet Ciro A. Noronha, Ph.D. Cobalt Digital Santa Clara, CA ciro.noronha@cobaltdigital.com Juliana W. Noronha University of California, Davis
More informationEfficient Processing of Top-k Dominating Queries on Multi-Dimensional Data
Efficient Processing of To-k Dominating Queries on Multi-Dimensional Data Man Lung Yiu Deartment of Comuter Science Aalborg University DK-922 Aalborg, Denmark mly@cs.aau.dk Nikos Mamoulis Deartment of
More informationA Model-Adaptable MOSFET Parameter Extraction System
A Model-Adatable MOSFET Parameter Extraction System Masaki Kondo Hidetoshi Onodera Keikichi Tamaru Deartment of Electronics Faculty of Engineering, Kyoto University Kyoto 66-1, JAPAN Tel: +81-7-73-313
More informationFace Recognition Based on Wavelet Transform and Adaptive Local Binary Pattern
Face Recognition Based on Wavelet Transform and Adative Local Binary Pattern Abdallah Mohamed 1,2, and Roman Yamolskiy 1 1 Comuter Engineering and Comuter Science, University of Louisville, Louisville,
More informationUse of Multivariate Statistical Analysis in the Modelling of Chromatographic Processes
Use of Multivariate Statistical Analysis in the Modelling of Chromatograhic Processes Simon Edwards-Parton 1, Nigel itchener-hooker 1, Nina hornhill 2, Daniel Bracewell 1, John Lidell 3 Abstract his aer
More informationBuilding Better Nurse Scheduling Algorithms
Building Better Nurse Scheduling Algorithms Annals of Oerations Research, 128, 159-177, 2004. Dr Uwe Aickelin Dr Paul White School of Comuter Science University of the West of England University of Nottingham
More informationVisualization, Estimation and User-Modeling for Interactive Browsing of Image Libraries
Visualization, Estimation and User-Modeling for Interactive Browsing of Image Libraries Qi Tian, Baback Moghaddam 2 and Thomas S. Huang Beckman Institute, University of Illinois, Urbana-Chamaign, IL 680,
More informationVehicle Logo Recognition Using Modest AdaBoost and Radial Tchebichef Moments
Proceedings of 0 4th International Conference on Machine Learning and Comuting IPCSIT vol. 5 (0) (0) IACSIT Press, Singaore Vehicle Logo Recognition Using Modest AdaBoost and Radial Tchebichef Moments
More informationAUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K.
inuts er clock cycle Streaming ermutation oututs er clock cycle AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS Ren Chen and Viktor K.
More informationSelecting Discriminative Binary Patterns for a Local Feature
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 15, No 3 Sofia 015 rint ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-015-0044 Selecting Discriminative Binary atterns
More informationOMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications
OMNI: An Efficient Overlay Multicast Infrastructure for Real-time Alications Suman Banerjee, Christoher Kommareddy, Koushik Kar, Bobby Bhattacharjee, Samir Khuller Abstract We consider an overlay architecture
More informationFigure 8.1: Home age taken from the examle health education site (htt:// Setember 14, 2001). 201
200 Chater 8 Alying the Web Interface Profiles: Examle Web Site Assessment 8.1 Introduction This chater describes the use of the rofiles develoed in Chater 6 to assess and imrove the quality of an examle
More informationInteractive Image Segmentation
Interactive Image Segmentation Fahim Mannan (260 266 294) Abstract This reort resents the roject work done based on Boykov and Jolly s interactive grah cuts based N-D image segmentation algorithm([1]).
More informationImproved Image Super-Resolution by Support Vector Regression
Proceedings of International Joint Conference on Neural Networks, San Jose, California, USA, July 3 August 5, 0 Imroved Image Suer-Resolution by Suort Vector Regression Le An and Bir Bhanu Abstract Suort
More informationSPARSE SIGNAL REPRESENTATION FOR COMPLEX-VALUED IMAGING Sadegh Samadi 1, M üjdat Çetin 2, Mohammad Ali Masnadi-Shirazi 1
SPARSE SIGNAL REPRESENTATION FOR COMPLEX-VALUED IMAGING Sadegh Samadi 1, M üjdat Çetin, Mohammad Ali Masnadi-Shirazi 1 1. Shiraz University, Shiraz, Iran,. Sabanci University, Istanbul, Turkey ssamadi@shirazu.ac.ir,
More informationarxiv: v1 [cs.mm] 18 Jan 2016
Lossless Intra Coding in with 3-ta Filters Saeed R. Alvar a, Fatih Kamisli a a Deartment of Electrical and Electronics Engineering, Middle East Technical University, Turkey arxiv:1601.04473v1 [cs.mm] 18
More informationEfficient Parallel Hierarchical Clustering
Efficient Parallel Hierarchical Clustering Manoranjan Dash 1,SimonaPetrutiu, and Peter Scheuermann 1 Deartment of Information Systems, School of Comuter Engineering, Nanyang Technological University, Singaore
More informationIMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model
IMS Network Deloyment Cost Otimization Based on Flow-Based Traffic Model Jie Xiao, Changcheng Huang and James Yan Deartment of Systems and Comuter Engineering, Carleton University, Ottawa, Canada {jiexiao,
More informationImproving Trust Estimates in Planning Domains with Rare Failure Events
Imroving Trust Estimates in Planning Domains with Rare Failure Events Colin M. Potts and Kurt D. Krebsbach Det. of Mathematics and Comuter Science Lawrence University Aleton, Wisconsin 54911 USA {colin.m.otts,
More informationSource Coding and express these numbers in a binary system using M log
Source Coding 30.1 Source Coding Introduction We have studied how to transmit digital bits over a radio channel. We also saw ways that we could code those bits to achieve error correction. Bandwidth is
More informationAn Indexing Framework for Structured P2P Systems
An Indexing Framework for Structured P2P Systems Adina Crainiceanu Prakash Linga Ashwin Machanavajjhala Johannes Gehrke Carl Lagoze Jayavel Shanmugasundaram Deartment of Comuter Science, Cornell University
More informationPatterned Wafer Segmentation
atterned Wafer Segmentation ierrick Bourgeat ab, Fabrice Meriaudeau b, Kenneth W. Tobin a, atrick Gorria b a Oak Ridge National Laboratory,.O.Box 2008, Oak Ridge, TN 37831-6011, USA b Le2i Laboratory Univ.of
More informationEquality-Based Translation Validator for LLVM
Equality-Based Translation Validator for LLVM Michael Ste, Ross Tate, and Sorin Lerner University of California, San Diego {mste,rtate,lerner@cs.ucsd.edu Abstract. We udated our Peggy tool, reviously resented
More informationAUTOMATIC 3D SURFACE RECONSTRUCTION BY COMBINING STEREOVISION WITH THE SLIT-SCANNER APPROACH
AUTOMATIC 3D SURFACE RECONSTRUCTION BY COMBINING STEREOVISION WITH THE SLIT-SCANNER APPROACH A. Prokos 1, G. Karras 1, E. Petsa 2 1 Deartment of Surveying, National Technical University of Athens (NTUA),
More informationSensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s
Sensitivity two stage EOQ model 1 Sensitivity of multi-roduct two-stage economic lotsizing models and their deendency on change-over and roduct cost ratio s Frank Van den broecke, El-Houssaine Aghezzaf,
More informationPREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS
PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS Kevin Miller, Vivian Lin, and Rui Zhang Grou ID: 5 1. INTRODUCTION The roblem we are trying to solve is redicting future links or recovering missing links
More informationMatlab Virtual Reality Simulations for optimizations and rapid prototyping of flexible lines systems
Matlab Virtual Reality Simulations for otimizations and raid rototying of flexible lines systems VAMVU PETRE, BARBU CAMELIA, POP MARIA Deartment of Automation, Comuters, Electrical Engineering and Energetics
More informationEE678 Application Presentation Content Based Image Retrieval Using Wavelets
EE678 Alication Presentation Content Based Image Retrieval Using Wavelets Grou Members: Megha Pandey megha@ee. iitb.ac.in 02d07006 Gaurav Boob gb@ee.iitb.ac.in 02d07008 Abstract: We focus here on an effective
More informationSPITFIRE: Scalable Parallel Algorithms for Test Set Partitioned Fault Simulation
To aear in IEEE VLSI Test Symosium, 1997 SITFIRE: Scalable arallel Algorithms for Test Set artitioned Fault Simulation Dili Krishnaswamy y Elizabeth M. Rudnick y Janak H. atel y rithviraj Banerjee z y
More informationMulti-robot SLAM with Unknown Initial Correspondence: The Robot Rendezvous Case
Multi-robot SLAM with Unknown Initial Corresondence: The Robot Rendezvous Case Xun S. Zhou and Stergios I. Roumeliotis Deartment of Comuter Science & Engineering, University of Minnesota, Minneaolis, MN
More informationFacial Expression Recognition using Image Processing and Neural Network
Keerti Keshav Kanchi / International Journal of Comuter Science & Engineering Technology (IJCSET) Facial Exression Recognition using Image Processing and eural etwork Keerti Keshav Kanchi PG Student, Deartment
More informationEfficient Sequence Generator Mining and its Application in Classification
Efficient Sequence Generator Mining and its Alication in Classification Chuancong Gao, Jianyong Wang 2, Yukai He 3 and Lizhu Zhou 4 Tsinghua University, Beijing 0084, China {gaocc07, heyk05 3 }@mails.tsinghua.edu.cn,
More informationSKIN CANCER LESION CLASSIFICATION USING LBP BASED HYBRID CLASSIFIER
DOI: htt://dx.doi.org/10.26483/ijarcs.v8i7.4469 Volume 8, No. 7, July August 2017 International Journal of Advanced Research in Comuter Science RESEARCH PAPER Available Online at www.ijarcs.info ISSN No.
More informationMulticast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1
Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Sanning Trees 1 Honge Wang y and Douglas M. Blough z y Myricom Inc., 325 N. Santa Anita Ave., Arcadia, CA 916, z School of Electrical and
More informationTexture Mapping with Vector Graphics: A Nested Mipmapping Solution
Texture Maing with Vector Grahics: A Nested Mimaing Solution Wei Zhang Yonggao Yang Song Xing Det. of Comuter Science Det. of Comuter Science Det. of Information Systems Prairie View A&M University Prairie
More information10. Parallel Methods for Data Sorting
10. Parallel Methods for Data Sorting 10. Parallel Methods for Data Sorting... 1 10.1. Parallelizing Princiles... 10.. Scaling Parallel Comutations... 10.3. Bubble Sort...3 10.3.1. Sequential Algorithm...3
More informationUsing Permuted States and Validated Simulation to Analyze Conflict Rates in Optimistic Replication
Using Permuted States and Validated Simulation to Analyze Conflict Rates in Otimistic Relication An-I A. Wang Comuter Science Deartment Florida State University Geoff H. Kuenning Comuter Science Deartment
More informationAN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY
AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY Andrew Lam 1, Steven J.E. Wilton 1, Phili Leong 2, Wayne Luk 3 1 Elec. and Com. Engineering 2 Comuter Science
More informationRobust Motion Estimation for Video Sequences Based on Phase-Only Correlation
Robust Motion Estimation for Video Sequences Based on Phase-Only Correlation Loy Hui Chien and Takafumi Aoki Graduate School of Information Sciences Tohoku University Aoba-yama 5, Sendai, 98-8579, Jaan
More informationTo appear in IEEE TKDE Title: Efficient Skyline and Top-k Retrieval in Subspaces Keywords: Skyline, Top-k, Subspace, B-tree
To aear in IEEE TKDE Title: Efficient Skyline and To-k Retrieval in Subsaces Keywords: Skyline, To-k, Subsace, B-tree Contact Author: Yufei Tao (taoyf@cse.cuhk.edu.hk) Deartment of Comuter Science and
More informationSwift Template Matching Based on Equivalent Histogram
Swift emlate Matching ased on Equivalent istogram Wangsheng Yu, Xiaohua ian, Zhiqiang ou * elecommunications Engineering Institute Air Force Engineering University Xi an, PR China *corresonding author:
More informationRobust Real Time Pattern Matching using Bayesian Sequential Hypothesis Testing
Robust Real Time Pattern Matching using Bayesian Sequential Hyothesis Testing Ofir Pele and Michael Werman Abstract This aer describes a method for robust real time attern matching. We first introduce
More informationEnsemble Learning Based on Parametric Triangular Norms
Send Orders for Rerints to rerints@benthamscience.ae The Oen Automation and Control Systems Journal, 2014, 6, 997-1003 997 Ensemble Learning Based on Parametric Triangular Norms Oen Access Pengtao Jia
More informationFast Distributed Process Creation with the XMOS XS1 Architecture
Communicating Process Architectures 20 P.H. Welch et al. (Eds.) IOS Press, 20 c 20 The authors and IOS Press. All rights reserved. Fast Distributed Process Creation with the XMOS XS Architecture James
More informationPattern Recognition Letters
Pattern Recognition Letters 30 (2009) 114 122 Contents lists available at ScienceDirect Pattern Recognition Letters journal homeage: www.elsevier.com/locate/atrec A stroke filter and its alication to text
More informationComplexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks
Journal of Comuting and Information Technology - CIT 8, 2000, 1, 1 12 1 Comlexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks Eunice E. Santos Deartment of Electrical
More informationCENTRAL AND PARALLEL PROJECTIONS OF REGULAR SURFACES: GEOMETRIC CONSTRUCTIONS USING 3D MODELING SOFTWARE
CENTRAL AND PARALLEL PROJECTIONS OF REGULAR SURFACES: GEOMETRIC CONSTRUCTIONS USING 3D MODELING SOFTWARE Petra Surynková Charles University in Prague, Faculty of Mathematics and Physics, Sokolovská 83,
More informationAn Efficient Video Program Delivery algorithm in Tree Networks*
3rd International Symosium on Parallel Architectures, Algorithms and Programming An Efficient Video Program Delivery algorithm in Tree Networks* Fenghang Yin 1 Hong Shen 1,2,** 1 Deartment of Comuter Science,
More informationFace Recognition with Local Binary Patterns
Face Recognition with Local Binary Patterns Ammad Ali, Shah Hussain, Farah Haroon, Sajid Hussain and M. Farhan Khan Abstract- This aer is about roviding efficient face recognition i.e. feature extraction
More informationRecord Route IP Traceback: Combating DoS Attacks and the Variants
Record Route IP Traceback: Combating DoS Attacks and the Variants Abdullah Yasin Nur, Mehmet Engin Tozal University of Louisiana at Lafayette, Lafayette, LA, US ayasinnur@louisiana.edu, metozal@louisiana.edu
More informationAn empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs
An emirical analysis of looy belief roagation in three toologies: grids, small-world networks and random grahs R. Santana, A. Mendiburu and J. A. Lozano Intelligent Systems Grou Deartment of Comuter Science
More informationStatistical Detection for Network Flooding Attacks
Statistical Detection for Network Flooding Attacks C. S. Chao, Y. S. Chen, and A.C. Liu Det. of Information Engineering, Feng Chia Univ., Taiwan 407, OC. Email: cschao@fcu.edu.tw Abstract In order to meet
More informationProcess and Measurement System Capability Analysis
Process and Measurement System aability Analysis Process caability is the uniformity of the rocess. Variability is a measure of the uniformity of outut. Assume that a rocess involves a quality characteristic
More informationEach copy of any part of a JSTOR transmission must contain the same copyright notice that appears on the screen or printed page of such transmission.
An Interactive Programming Method for Solving the Multile Criteria Problem Author(s): Stanley Zionts and Jyrki Wallenius Source: Management Science, Vol. 22, No. 6 (Feb., 1976),. 652-663 Published by:
More informationParallel Construction of Multidimensional Binary Search Trees. Ibraheem Al-furaih, Srinivas Aluru, Sanjay Goil Sanjay Ranka
Parallel Construction of Multidimensional Binary Search Trees Ibraheem Al-furaih, Srinivas Aluru, Sanjay Goil Sanjay Ranka School of CIS and School of CISE Northeast Parallel Architectures Center Syracuse
More informationAnalyzing Borders Between Partially Contradicting Fuzzy Classification Rules
Analyzing Borders Between Partially Contradicting Fuzzy Classification Rules Andreas Nürnberger, Aljoscha Klose, Rudolf Kruse University of Magdeburg, Faculty of Comuter Science 39106 Magdeburg, Germany
More informationA New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism
A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism Erlin Yao, Mingyu Chen, Rui Wang, Wenli Zhang, Guangming Tan Key Laboratory of Comuter System and Architecture Institute
More informationDepth Estimation for 2D to 3D Football Video Conversion
International Research Journal of Alied and Basic Sciences 2013 Available online at www.irjabs.com ISSN 2251-838X / Vol, 6 (4): 475-480 Science Exlorer ublications Deth Estimation for 2D to 3D Football
More informationSkip List Based Authenticated Data Structure in DAS Paradigm
009 Eighth International Conference on Grid and Cooerative Comuting Ski List Based Authenticated Data Structure in DAS Paradigm Jieing Wang,, Xiaoyong Du,. Key Laboratory of Data Engineering and Knowledge
More informationImprove Precategorized Collection Retrieval by Using Supervised Term Weighting Schemes Λ
Imrove Precategorized Collection Retrieval by Using Suervised Term Weighting Schemes Λ Ying Zhao and George Karyis University of Minnesota, Deartment of Comuter Science Minneaolis, MN 55455 Abstract The
More informationSubmission. Verifying Properties Using Sequential ATPG
Verifying Proerties Using Sequential ATPG Jacob A. Abraham and Vivekananda M. Vedula Comuter Engineering Research Center The University of Texas at Austin Austin, TX 78712 jaa, vivek @cerc.utexas.edu Daniel
More informationIntroduction to Parallel Algorithms
CS 1762 Fall, 2011 1 Introduction to Parallel Algorithms Introduction to Parallel Algorithms ECE 1762 Algorithms and Data Structures Fall Semester, 2011 1 Preliminaries Since the early 1990s, there has
More informationCollective communication: theory, practice, and experience
CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE Concurrency Comutat.: Pract. Exer. 2007; 19:1749 1783 Published online 5 July 2007 in Wiley InterScience (www.interscience.wiley.com)..1206 Collective
More informationPrivacy Preserving Moving KNN Queries
Privacy Preserving Moving KNN Queries arxiv:4.76v [cs.db] 4 Ar Tanzima Hashem Lars Kulik Rui Zhang National ICT Australia, Deartment of Comuter Science and Software Engineering University of Melbourne,
More informationVariability-Aware Parametric Yield Estimation for Analog/Mixed-Signal Circuits: Concepts, Algorithms and Challenges
Variability-Aware Parametric Yield Estimation for Analog/Mixed-Signal Circuits: Concets, Algorithms and Challenges Fang Gong Cadence Design Systems, Inc. 2655 Seely Ave., San Jose, CA fgong@cadence.com
More informationLeak Detection Modeling and Simulation for Oil Pipeline with Artificial Intelligence Method
ITB J. Eng. Sci. Vol. 39 B, No. 1, 007, 1-19 1 Leak Detection Modeling and Simulation for Oil Pieline with Artificial Intelligence Method Pudjo Sukarno 1, Kuntjoro Adji Sidarto, Amoranto Trisnobudi 3,
More informationExtracting Optimal Paths from Roadmaps for Motion Planning
Extracting Otimal Paths from Roadmas for Motion Planning Jinsuck Kim Roger A. Pearce Nancy M. Amato Deartment of Comuter Science Texas A&M University College Station, TX 843 jinsuckk,ra231,amato @cs.tamu.edu
More informationSemi-Supervised Learning Based Object Detection in Aerial Imagery
Semi-Suervised Learning Based Obect Detection in Aerial Imagery Jian Yao Zhongfei (Mark) Zhang Deartment of Comuter Science, State University of ew York at Binghamton, Y 13905, USA yao@binghamton.edu Zhongfei@cs.binghamton.edu
More informationSpace-efficient Region Filling in Raster Graphics
"The Visual Comuter: An International Journal of Comuter Grahics" (submitted July 13, 1992; revised December 7, 1992; acceted in Aril 16, 1993) Sace-efficient Region Filling in Raster Grahics Dominik Henrich
More informationParametric Optimization in WEDM of WC-Co Composite by Neuro-Genetic Technique
Parametric Otimization in WEDM of WC-Co Comosite by Neuro-Genetic Technique P. Saha*, P. Saha, and S. K. Pal Abstract The resent work does a multi-objective otimization in wire electro-discharge machining
More informationRelations with Relation Names as Arguments: Algebra and Calculus. Kenneth A. Ross. Columbia University.
Relations with Relation Names as Arguments: Algebra and Calculus Kenneth A. Ross Columbia University kar@cs.columbia.edu Abstract We consider a version of the relational model in which relation names may
More informationShort Papers. Symmetry Detection by Generalized Complex (GC) Moments: A Close-Form Solution 1 INTRODUCTION
466 IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE VOL 2 NO 5 MAY 999 Short Paers Symmetry Detection by Generalized Comlex (GC) Moments: A Close-Form Solution Dinggang Shen Horace HS I
More informationBlind Separation of Permuted Alias Image Base on Four-phase-difference and Differential Evolution
Sensors & Transducers, Vol. 63, Issue, January 204,. 90-95 Sensors & Transducers 204 by IFSA Publishing, S. L. htt://www.sensorsortal.com lind Searation of Permuted Alias Image ase on Four-hase-difference
More informationReal-time Character Posing Using Millions of Natural Human Poses
Real-time Character Posing Using Millions of Natural Human Poses Xiaolin K. Wei and Jinxiang Chai Texas A&M University Abstract We resent intuitive interfaces for interactively osing 3D human characters.
More informationObject and Native Code Thread Mobility Among Heterogeneous Computers
Object and Native Code Thread Mobility Among Heterogeneous Comuters Bjarne Steensgaard Eric Jul Microsoft Research DIKU (Det. of Comuter Science) One Microsoft Way University of Coenhagen Redmond, WA 98052
More informationA BICRITERION STEINER TREE PROBLEM ON GRAPH. Mirko VUJO[EVI], Milan STANOJEVI] 1. INTRODUCTION
Yugoslav Journal of Oerations Research (00), umber, 5- A BICRITERIO STEIER TREE PROBLEM O GRAPH Mirko VUJO[EVI], Milan STAOJEVI] Laboratory for Oerational Research, Faculty of Organizational Sciences University
More informationHigh Quality Offset Printing An Evolutionary Approach
High Quality Offset Printing An Evolutionary Aroach Ralf Joost Institute of Alied Microelectronics and omuter Engineering University of Rostock Rostock, 18051, Germany +49 381 498 7272 ralf.joost@uni-rostock.de
More informationAn integrated system for virtual scene rendering, stereo reconstruction, and accuracy estimation.
An integrated system for virtual scene rendering, stereo reconstruction, and accuracy estimation. Marichal-Hernández J.G., Pérez Nava F*., osa F., estreo., odríguez-amos J.M. Universidad de La Laguna,
More informationPivot Selection for Dimension Reduction Using Annealing by Increasing Resampling *
ivot Selection for Dimension Reduction Using Annealing by Increasing Resamling * Yasunobu Imamura 1, Naoya Higuchi 1, Tetsuji Kuboyama 2, Kouichi Hirata 1 and Takeshi Shinohara 1 1 Kyushu Institute of
More informationSEMI-AUTOMATIC ROAD EXTRACTION FROM HIGH-RESOLUTION SATELLITE IMAGE
SEMI-AUOMAIC ROAD EXRACION FROM HIGH-RESOLUION SAELLIE IMAGE Commission III KEY WORDS: Road Extraction, High-Resolution Satellite Image, Urban area, Semi-automatic ABSRAC: In this research, a method is
More informationHigh Quality Offset Printing An Evolutionary Approach
High Quality Offset Printing An Evolutionary Aroach Ralf Joost Institute of Alied Microelectronics and omuter Engineering University of Rostock Rostock, 18051, Germany +49 381 498 7272 ralf.joost@uni-rostock.de
More informationCollective Communication: Theory, Practice, and Experience. FLAME Working Note #22
Collective Communication: Theory, Practice, and Exerience FLAME Working Note # Ernie Chan Marcel Heimlich Avi Purkayastha Robert van de Geijn Setember, 6 Abstract We discuss the design and high-erformance
More informationA STUDY ON CALIBRATION OF DIGITAL CAMERA
A STUDY ON CALIBRATION OF DIGITAL CAMERA Ryuji Matsuoka a, *, Kiyonari Fukue a, Kohei Cho a, Haruhisa Shimoda a, Yoshiaki Matsumae a, Kenji Hongo b, Seiju Fujiwara b a Tokai University Research & Information
More informationSaliency-Based Robust Correlation for Real-Time Face Registration and Verification Λ
Saliency-Based Robust Correlation for Real-Time Face Registration and Verification Λ K. Jonsson, J. Matas, J. Kittler and S. Haberl Centre for Vision, Speech and Signal Processing University of Surrey
More informationA GPU Heterogeneous Cluster Scheduling Model for Preventing Temperature Heat Island
A GPU Heterogeneous Cluster Scheduling Model for Preventing Temerature Heat Island Yun-Peng CAO 1,2,a and Hai-Feng WANG 1,2 1 School of Information Science and Engineering, Linyi University, Linyi Shandong,
More informationA Fuzzy Self-Constructing Feature Clustering Algorithm for Text Classification
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-302, -ISSN: 2278-879, Volume 2, Issue 9 (Setember 202), PP 36-44 A Fuzzy Self-Constructing Feature Clustering Algorithm for Text Classification A.Kavitha,
More information