Sciweavers

431 search results - page 24 / 87
» 4OR: Year 4
Sort
View
MMSEC
2006
ACM
167views Multimedia» more  MMSEC 2006»
14 years 1 months ago
Hermite polynomials as provably good functions to watermark white gaussian hosts
In the watermark detection scenario, also known as zero-bit watermarking, a watermark, carrying no hidden message, is inserted in content. The watermark detector checks for the pr...
Teddy Furon
MMSEC
2006
ACM
213views Multimedia» more  MMSEC 2006»
14 years 1 months ago
Parameter optimization for biometric fingerprint recognition using genetic algorithms
In this paper, we suggest an optimization approach for fingerprint authentication using genetic algorithms. Our application was planned so that it can be used without great effort...
Tobias Scheidat, Andreas Engel, Claus Vielhauer
IPPS
2005
IEEE
14 years 1 months ago
Message Passing for Linux Clusters with Gigabit Ethernet Mesh Connections
Multiple copper-based commodity Gigabit Ethernet (GigE) interconnects (adapters) on a single host can lead to Linux clusters with mesh/torus connections without using expensive sw...
Jie Chen, William A. Watson III, Robert Edwards, W...
VL
2005
IEEE
137views Visual Languages» more  VL 2005»
14 years 1 months ago
CAM: A Mobile Paper-Based Information Services Architecture for Remote Rural Areas in the Developing World
During our work with microfinance groups in rural India, we found that paper plays a crucial role in many local information practices. However, paperbased record keeping can be in...
Tapan S. Parikh
ACMACE
2005
ACM
14 years 1 months ago
Achieving fairness in multiplayer network games through automated latency balancing
Over the past few years, the prominence of multiplayer network gaming has increased dramatically in the Internet. The effect of network delay (lag) on multiplayer network gaming h...
Sebastian Zander, Ian Leeder, Grenville J. Armitag...