👨🏽‍💻 Domiziano's Notes
Search
Search
Search
Light mode
Dark mode
Explorer
Biometric Systems
3D Face Recognition
All (Probes )Against All (Gallery)
Anti-Spoofing Evaluation
Bertillonage
Biometric traits requirements
Comparing Face with other biometric traits
Complete All Against All
Cumulative Match Score and Cumulative Match Characteristic Curve (CMS and CMC)
Decidability value
Detection and Identification Rate at rank K (DIR)
Doddington Zoo
Ear Recognition
EBGM - Elastic Bunch Graph Matching
Equal Error Rate
Evaluation between systems in Face Recognition
Face Localization - Hsu, Mottaleb and Jain algorithm
Face Localization - Viola Jones algorithm
Face Recognizer
Face Representations
False Acceptance Rate and False Rejection Rate
Fingerprint Recognition
Genuine Acceptance Rate, Genuine Rejection Rate, and their relationship with the other rates
Global (or holistic) methods vs Local methods
Haar features
Impostor and Client score distributions
Iris Recognition
LBP - Local Binary Pattern
Localization performance evaluation
Multibiometric systems
Open and Closed set identification
Performance Evaluation
Popular Datasets
Possible spaces in which represent a face
Problems in biometrics systems
Problems with Face Recognition
Reliability of an Identification System
ROC, DET and AUC
Sample, Templates, Probe, and Gallery sets
Spoofing in Face Recognition
Text-dependency and User-dependency
Threshold in Biometric Verification
Verification, Identification, Re-Identification, and Continuous Identification.
Wavelet Transforms vs Fourier Transforms
Distributed Systems
Akamai
Algorand
Anonymity on the Internet
ASICs
Atomic Commit
Bitcoin
Bitcoin Address Generation
CAP Theorem
Chandy-Lamport Protocol for Distributed Snapshot
Coinbase Transaction
Consistency of intersection and union of cuts
Dark Web
Deadlock
Decentralized vs. Distributed
Different Types of Blockchain
Diffie Hellman protocol
Distributed System
Double Spending
Ethereum
Failure Detector
Fork (in Blockchain)
GPDR
Hash Function
Hashing on the Blockchain
Lamport Clock
Light Nodes vs Full Nodes
LMD-GHOST and FFG
Lower Bounds in Consensus
Offline Performance Evaluation
Paxos
Peer to Peer
Proof of Stake
Proof of Work
Pseudonimity
Public Key Cryptography
Pump and Dump
Safety vs Liveness
Script
Smart Contracts
Space-Time Diagram
Terminology - History, Run, Local State, Global state, and Cut
The Blockchain Technology
The Merge
TOR - The Onion Router
Transaction Model and UTXOs
Games Theory
Energy Games
Indexes
Index - Advanced Machine Learning
Index - Biometric Systems
Index - Blockchain and Distributed Ledger Technologies
Index - Deep Learning
Index - Distributed Systems
Index - Linear Algebra
Linear Algebra
Linear Maps
Matrix
Vector Lengths and Distances
Vector Space
Machine Learning
3D Object Detection
Activation Functions
AdaBoost
Autoencoders
Backpropagation
Batch Normalization
BERT
BYOL
Classification
Contrastive Learning
Convolutional Neural Networks
Curse of dimesionality
Data in Machine Learning
Deep Learning
Deep ReLU Networks
Deep Representations for Visual Search
Distillation
Double Descent
Dropout
Early Stopping
Embeddings
Embodied AI
Entropy
Examples of Sequence Modelling Problems
Fast R-CNN
Faster R-CNN
Generative Models
Geometric Deep Learning
Gradient
Gradient Descent
Graph Neural Networks
Hyperbolic Deep Learning
Hyperparameter tuning and Transfer Learning
Invariances and Equivariances
Jensen’s inequality
K-Fold Cross Validation
Kullback-Leibler divergence
LDA - Linear Discriminant Analysis
Linear Regression
Logistic Regression
Long Short Term Memory (LSTMs)
Mask R-CNN
Meta-Learning
MoCo V1 & V2
Multi Layer Perceptron
Neural Network
Non-Linear Models
Object Detection
Object Search
Overfitting and Underfitting
PCA - Principal Component Analysis
Person Search
Polynomial Regression
Pose Forecasting
Prior Knowledge
R-CNN
Recurrent Neural Networks (RNN)
Regularization
Selective Search
Self-Supervised Learning
Semantic Search
Semantic Segmentation
Sequence Models
SIFT Descriptor
SimCLR
SimSiam
Single Stage Object Detectors
Social Navigation
Supervised and Semi-Supervised Systems
Support Vector Machines
Temporal Convolutional Networks (TCN)
The Stone-Weierstrass theorem
Transformers
Visual Search
Need to be divided in multiple parts
Fundamentals of Data Science
Human-Computer Interaction on the Web
Q&A
BS - Q&A for Oral Exam (in Italian)
FDS - Concepts for the Final quiz
HCI - Domande e Risposte
WIP
Adversarial Attacks on GANs
Generative Adversarial Networks
Manifold Hypothesis
README
Untitled
Home
❯
Untitled
Untitled
Graph View
Backlinks
No backlinks found