👨🏽‍💻 Domiziano's Notes
Search
Search
Search
Light mode
Dark mode
Explorer
Biometric Systems
3D Face Recognition
All (Probes )Against All (Gallery)
Anti-Spoofing Evaluation
Bertillonage
Biometric traits requirements
Comparing Face with other biometric traits
Complete All Against All
Cumulative Match Score and Cumulative Match Characteristic Curve (CMS and CMC)
Decidability value
Detection and Identification Rate at rank K (DIR)
Doddington Zoo
Ear Recognition
EBGM - Elastic Bunch Graph Matching
Equal Error Rate
Evaluation between systems in Face Recognition
Face Localization - Hsu, Mottaleb and Jain algorithm
Face Localization - Viola Jones algorithm
Face Recognizer
Face Representations
False Acceptance Rate and False Rejection Rate
Fingerprint Recognition
Genuine Acceptance Rate, Genuine Rejection Rate, and their relationship with the other rates
Global (or holistic) methods vs Local methods
Haar features
Impostor and Client score distributions
Iris Recognition
LBP - Local Binary Pattern
Localization performance evaluation
Multibiometric systems
Open and Closed set identification
Performance Evaluation
Popular Datasets
Possible spaces in which represent a face
Problems in biometrics systems
Problems with Face Recognition
Reliability of an Identification System
ROC, DET and AUC
Sample, Templates, Probe, and Gallery sets
Spoofing in Face Recognition
Text-dependency and User-dependency
Threshold in Biometric Verification
Verification, Identification, Re-Identification, and Continuous Identification.
Wavelet Transforms vs Fourier Transforms
Distributed Systems
Akamai
Algorand
Anonymity on the Internet
ASICs
Atomic Commit
Bitcoin
Bitcoin Address Generation
CAP Theorem
Chandy-Lamport Protocol for Distributed Snapshot
Coinbase Transaction
Consistency of intersection and union of cuts
Dark Web
Deadlock
Decentralized vs. Distributed
Different Types of Blockchain
Diffie Hellman protocol
Distributed System
Double Spending
Ethereum
Failure Detector
Fork (in Blockchain)
GPDR
Hash Function
Hashing on the Blockchain
Lamport Clock
Light Nodes vs Full Nodes
LMD-GHOST and FFG
Lower Bounds in Consensus
Offline Performance Evaluation
Paxos
Peer to Peer
Proof of Stake
Proof of Work
Pseudonimity
Public Key Cryptography
Pump and Dump
Safety vs Liveness
Script
Smart Contracts
Space-Time Diagram
Terminology - History, Run, Local State, Global state, and Cut
The Blockchain Technology
The Merge
TOR - The Onion Router
Transaction Model and UTXOs
Games Theory
Energy Games
Indexes
Index - Advanced Machine Learning
Index - Biometric Systems
Index - Blockchain and Distributed Ledger Technologies
Index - Deep Learning
Index - Distributed Systems
Index - Linear Algebra
Linear Algebra
Linear Maps
Matrix
Vector Lengths and Distances
Vector Space
Machine Learning
3D Object Detection
Activation Functions
AdaBoost
Autoencoders
Backpropagation
Batch Normalization
BERT
BYOL
Classification
Contrastive Learning
Convolutional Neural Networks
Curse of dimesionality
Data in Machine Learning
Deep Learning
Deep ReLU Networks
Deep Representations for Visual Search
Distillation
Double Descent
Dropout
Early Stopping
Embeddings
Embodied AI
Entropy
Examples of Sequence Modelling Problems
Fast R-CNN
Faster R-CNN
Generative Models
Geometric Deep Learning
Gradient
Gradient Descent
Graph Neural Networks
Hyperbolic Deep Learning
Hyperparameter tuning and Transfer Learning
Invariances and Equivariances
Jensen’s inequality
K-Fold Cross Validation
Kullback-Leibler divergence
LDA - Linear Discriminant Analysis
Linear Regression
Logistic Regression
Long Short Term Memory (LSTMs)
Mask R-CNN
Meta-Learning
MoCo V1 & V2
Multi Layer Perceptron
Neural Network
Non-Linear Models
Object Detection
Object Search
Overfitting and Underfitting
PCA - Principal Component Analysis
Person Search
Polynomial Regression
Pose Forecasting
Prior Knowledge
R-CNN
Recurrent Neural Networks (RNN)
Regularization
Selective Search
Self-Supervised Learning
Semantic Search
Semantic Segmentation
Sequence Models
SIFT Descriptor
SimCLR
SimSiam
Single Stage Object Detectors
Social Navigation
Supervised and Semi-Supervised Systems
Support Vector Machines
Temporal Convolutional Networks (TCN)
The Stone-Weierstrass theorem
Transformers
Visual Search
Need to be divided in multiple parts
Fundamentals of Data Science
Human-Computer Interaction on the Web
Q&A
BS - Q&A for Oral Exam (in Italian)
FDS - Concepts for the Final quiz
HCI - Domande e Risposte
WIP
Adversarial Attacks on GANs
Generative Adversarial Networks
Manifold Hypothesis
README
Untitled
Home
❯
Distributed Systems
Folder: Distributed-Systems
45 items under this folder.
Mar 18, 2024
Anonymity on the Internet
Mar 18, 2024
Atomic Commit
Mar 18, 2024
Bitcoin Address Generation
Mar 18, 2024
Bitcoin
Mar 18, 2024
CAP Theorem
Mar 18, 2024
Chandy-Lamport Protocol for Distributed Snapshot
Mar 18, 2024
Coinbase Transaction
Mar 18, 2024
Consistency of intersection and union of cuts
Mar 18, 2024
Dark Web
Mar 18, 2024
Deadlock
Mar 18, 2024
Decentralized vs. Distributed
Mar 18, 2024
Different Types of Blockchain
Mar 18, 2024
Diffie Hellman protocol
Mar 18, 2024
Distributed System
Mar 18, 2024
Double Spending
Mar 18, 2024
Ethereum
Mar 18, 2024
Failure Detector
Mar 18, 2024
Fork (in Blockchain)
Mar 18, 2024
GPDR
Mar 18, 2024
Hash Function
Mar 18, 2024
Hashing on the Blockchain
Mar 18, 2024
LMD-GHOST and FFG
Mar 18, 2024
Lamport Clock
Mar 18, 2024
Light Nodes vs Full Nodes
Mar 18, 2024
Lower Bounds in Consensus
Mar 18, 2024
Offline Performance Evaluation
Mar 18, 2024
Paxos
Mar 18, 2024
Peer to Peer
Mar 18, 2024
Proof of Stake
Mar 18, 2024
Proof of Work
Mar 18, 2024
Pseudonimity
Mar 18, 2024
Public Key Cryptography
Mar 18, 2024
Pump and Dump
Mar 18, 2024
Safety vs Liveness
Mar 18, 2024
Script
Mar 18, 2024
Smart Contracts
Mar 18, 2024
Space-Time Diagram
Mar 18, 2024
TOR - The Onion Router
Mar 18, 2024
Terminology - History, Run, Local State, Global state, and Cut
Mar 18, 2024
The Blockchain Technology
Mar 18, 2024
The Merge
Mar 18, 2024
Transaction Model and UTXOs
Mar 18, 2024
ASICs
Mar 18, 2024
Akamai
Mar 18, 2024
Algorand