نتایج جستجو برای: appearance fixing

تعداد نتایج: 99446  

Journal: :CoRR 2017
Wei Shen Yilu Guo Yan Wang Kai Zhao Bo Wang Alan L. Yuille

Age estimation from facial images is typically cast as a nonlinear regression problem. The main challenge of this problem is the facial feature space w.r.t. ages is heterogeneous, due to the large variation in facial appearance across different persons of the same age and the nonstationary property of aging patterns. In this paper, we propose Deep Regression Forests (DRFs), an end-to-end model,...

Journal: :The Onderstepoort journal of veterinary research 1981
H Huismans B J Erasmus

The bluetongue virus (BTV) core particle contains 2 major polypeptides, P3 and P7, and is surrounded by an outer capsid layer that is composed of the 2 major polypeptides, P2 and P5. Analysis of the immune precipitates from soluble 14C-labelled BTV polypeptides and hyper-immune rabbit and guinea-pig sera indicated that polypeptide P2 precipitates only with homologous BTV sera. This would indica...

Journal: :Cornell Internation Affairs Review 2008

Journal: :Nuclear Physics B - Proceedings Supplements 1998

Journal: :Journal of Clinical Investigation 2009

Journal: :Journal of Industrial & Engineering Chemistry 1915

Journal: :Communications of The ACM 2021

Internet security was once based on trust and needs to be updated.

2010
Duncan N. L. Menge Jeanne L. DeNoyer Jeremy W. Lichstein

BACKGROUND Symbiotic nitrogen (N)-fixing trees are rare in late-successional temperate forests, even though these forests are often N limited. Two hypotheses could explain this paradox. The 'phylogenetic constraints hypothesis' states that no late-successional tree taxa in temperate forests belong to clades that are predisposed to N fixation. Conversely, the 'selective constraints hypothesis' s...

2014
Rahul A. Bahulikar Ivone Torres-Jerez Eric Worley Kelly Craven Michael K. Udvardi

2014
Mu Zhang Heng Yin

Component hijacking is a class of vulnerabilities commonly appearing in Android applications. When these vulnerabilities are triggered by attackers, the vulnerable apps can exfiltrate sensitive information and compromise the data integrity on Android devices, on behalf of the attackers. It is often unrealistic to purely rely on developers to fix these vulnerabilities for two reasons: 1) it is a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید