Sciweavers

3170 search results - page 629 / 634
» A Model For Information Quality Change
Sort
View
ICB
2007
Springer
156views Biometrics» more  ICB 2007»
14 years 1 months ago
Robust Extraction of Secret Bits from Minutiae
Abstract. Our goal is to extract consistent bits from the same fingerprint in a noisy environment. Such bits can then be used as a secret key in several cryptographic applications...
Ee-Chien Chang, Sujoy Roy
IPSN
2007
Springer
14 years 1 months ago
Tracking multiple targets using binary proximity sensors
Recent work has shown that, despite the minimal information provided by a binary proximity sensor, a network of such sensors can provide remarkably good target tracking performanc...
Jaspreet Singh, Upamanyu Madhow, Rajesh Kumar 0003...
LOCA
2007
Springer
14 years 1 months ago
SocialMotion: Measuring the Hidden Social Life of a Building
In this paper we present an approach to analyzing the social behaviors that occur in a typical office space. We describe a system consisting of over 200 motion sensors connected ...
Christopher Richard Wren, Yuri A. Ivanov, Ishwinde...
JCDL
2006
ACM
176views Education» more  JCDL 2006»
14 years 1 months ago
A hierarchical, HMM-based automatic evaluation of OCR accuracy for a digital library of books
A number of projects are creating searchable digital libraries of printed books. These include the Million Book Project, the Google Book project and similar efforts from Yahoo an...
Shaolei Feng, R. Manmatha
SIGCOMM
2006
ACM
14 years 1 months ago
Growth codes: maximizing sensor network data persistence
Sensor networks are especially useful in catastrophic or emergency scenarios such as floods, fires, terrorist attacks or earthquakes where human participation may be too dangero...
Abhinav Kamra, Vishal Misra, Jon Feldman, Dan Rube...