Sciweavers

110 search results - page 9 / 22
» A Method for Estimating Authentication Performance over Time...
Sort
View
FGR
2006
IEEE
111views Biometrics» more  FGR 2006»
14 years 1 months ago
Registration of Expressions Data using a 3D Morphable Model
The registration of 3D scans of faces is a key step for many applications, in particular for building 3D Morphable Models. Although a number of algorithms are already available fo...
Curzio Basso, Pascal Paysan, Thomas Vetter
ISCC
2000
IEEE
156views Communications» more  ISCC 2000»
13 years 12 months ago
Inverse Multiplexing for ATM. Technical Operation, Applications and Performance Evaluation Study
-- In a WAN established infrastructure, one of the main problems ATM network planners and users face, when greater than T1/E1 bandwidth is required, is the high cost associated to ...
Marcos Postigo-Boix, Mónica Aguilar-Igartua...
CAV
2009
Springer
156views Hardware» more  CAV 2009»
14 years 2 months ago
Towards Performance Prediction of Compositional Models in Industrial GALS Designs
Systems and Networks on Chips (NoCs) are a prime design focus of many hardware manufacturers. In addition to functional verification, which is a difficult necessity, the chip desi...
Nicolas Coste, Holger Hermanns, Etienne Lantreibec...
RAID
2004
Springer
14 years 26 days ago
RheoStat: Real-Time Risk Management
As the frequency of attacks faced by the average host connected to the Internet increases, reliance on manual intervention for response is decreasingly tenable. Operating system an...
Ashish Gehani, Gershon Kedem
ICASSP
2010
IEEE
13 years 7 months ago
Gradient Polytope Faces Pursuit for large scale sparse recovery problems
Polytope Faces Pursuit is a greedy algorithm that performs Basis Pursuit with similar order complexity to Orthogonal Matching Pursuit. The algorithm adds one basis vector at a tim...
Aris Gretsistas, Ivan Damnjanovic, Mark D. Plumble...