• LFW

  • Referenced in 54 articles [sw31362]
  • images produce superior results for most face verification algorithms over the original images and over...
  • FaceNet

  • Referenced in 25 articles [sw21626]
  • field of face recognition, implementing face verification and recognition efficiently at scale presents serious challenges ... FaceNet, that directly learns a mapping from face images to a compact Euclidean space where ... been produced, tasks such as face recognition, verification and clustering can be easily implemented using ... triplets of roughly aligned matching / non-matching face patches generated using a novel online triplet...
  • DeepFace

  • Referenced in 22 articles [sw21625]
  • human-level performance in face verification. In modern face recognition, the conventional pipeline consists...
  • CosFace

  • Referenced in 5 articles [sw39109]
  • central task of face recognition, including face verification and identification, involves face feature discrimination. However...
  • DeepID3

  • Referenced in 3 articles [sw39588]
  • them suitable to face recognition. Joint face identification-verification supervisory signals are added to both ... proposed two architectures achieves 99.53% LFW face verification accuracy and 96.0% LFW rank-1 face ... respectively. A further discussion of LFW face verification result is given...
  • XM2VTSDB

  • Referenced in 47 articles [sw34437]
  • home page for the XM2VTSDB multi-modal face database project. In this project a large ... aquired within the M2VTS project (Multi Modal Verification for Teleservices and Security applications), a part ... multimodal identification of human faces. The goal of using a multimodal recognition scheme...
  • CPLFW

  • Referenced in 1 article [sw39584]
  • utilized as the benchmark of unconstrained face verification and due to big data driven machine ... poses, illuminations, occlusions and expressions, cross-age face is another challenge in face recognition. Different ... process is unavoidable in real world face verification. However, LFW does not pay much attention ... difference between positive/negative pairs and achieve face verification instead of attributes classification. We evaluate several...
  • AdaCos

  • Referenced in 2 articles [sw37053]
  • proposed AdaCos loss to large-scale face verification and identification datasets, including LFW, MegaFace ... Verification. Our results show that training deep neural networks with the AdaCos loss is stable ... able to achieve high face recognition accuracy. Our method outperforms state-of-the-art softmax...
  • DyTa

  • Referenced in 3 articles [sw22848]
  • detect defects in a program, static verification and dynamic test generation are two important proposed ... both of these techniques face their respective issues. Static verification produces false positives...
  • BIOMET

  • Referenced in 10 articles [sw02474]
  • biometric database with five different modalities, including face, voice, fingerprint, hand and signature data ... each modality are given. Preliminary monomodal verification results, obtained on a subcorpus of the BIOMET...
  • LightDP

  • Referenced in 2 articles [sw22665]
  • formal verification tools. However, existing formal methods for differential privacy face a dilemma: methods based...
  • Chapar

  • Referenced in 4 articles [sw22667]
  • render high responsiveness even in the face of site crashes and network partitions. Theoretical results ... present a framework called Chapar for modular verification of causal consistency for replicated key-value...
  • MegaFace

  • Referenced in 2 articles [sw37095]
  • Million Faces for Recognition at Scale. Recent face recognition experiments on a major benchmark ... gallery set. We present both identification and verification performance, evaluate performance with respect to pose...
  • Jerboa

  • Referenced in 1 article [sw10051]
  • that associates each topological element (vertex, edge, face, etc.) with relevant data as their geometric ... modeler editor is equipped with many static verification mechanisms that ensure that the generated modelers...
  • Moat

  • Referenced in 1 article [sw23080]
  • Enclave Programs. Security-critical applications constantly face threats from exploits in lower computing layers such ... several adversary models, and present a sound verification methodology (based on automated theorem proving...
  • ANSYS

  • Referenced in 685 articles [sw00044]
  • ANSYS offers a comprehensive software suite that spans...
  • cdd

  • Referenced in 113 articles [sw00114]
  • The program cdd+ (cdd, respectively) is a C...
  • CoCoA

  • Referenced in 649 articles [sw00143]
  • CoCoA is a system for Computations in Commutative...
  • GAP

  • Referenced in 3068 articles [sw00320]
  • GAP is a system for computational discrete algebra...