Sciweavers

2059 search results - page 314 / 412
» A Directed Threshold - Signature Scheme
Sort
View
SP
2009
IEEE
15 years 11 months ago
Privacy Weaknesses in Biometric Sketches
The increasing use of biometrics has given rise to new privacy concerns. Biometric encryption systems have been proposed in order to alleviate such concerns: rather than comparing...
Koen Simoens, Pim Tuyls, Bart Preneel
WIAMIS
2009
IEEE
15 years 11 months ago
Comparative evaluation of spatial context techniques for semantic image analysis
In this paper, two approaches to utilizing contextual information in semantic image analysis are presented and comparatively evaluated. Both approaches make use of spatial context...
Georgios Th. Papadopoulos, Carsten Saathoff, Marci...
WSOM
2009
Springer
15 years 11 months ago
Bag-of-Features Codebook Generation by Self-Organisation
Bag of features is a well established technique for the visual categorisation of objects, categories of objects and textures. One of the most important part of this technique is co...
Teemu Kinnunen, Joni-Kristian Kämärä...
DCOSS
2009
Springer
15 years 11 months ago
Detection and Localization Sensor Assignment with Exact and Fuzzy Locations
Sensor networks introduce new resource allocation problems in which sensors need to be assigned to the tasks they best help. Such problems have been previously studied in simplifi...
Hosam Rowaihy, Matthew P. Johnson, Diego Pizzocaro...
CCGRID
2008
IEEE
15 years 11 months ago
Application Resilience: Making Progress in Spite of Failure
Abstract—While measures such as raw compute performance and system capacity continue to be important factors for evaluating cluster performance, such issues as system reliability...
William M. Jones, John T. Daly, Nathan DeBardelebe...