Sciweavers

2009 search results - page 328 / 402
» A privacy-aware access control system
Sort
View
ICICIC
2006
IEEE
14 years 3 months ago
Fingerprint Identification Based on Frequency Texture Analysis
Nowadays the AFIS (Automatic fingerprint Identification system) plays more and more important roles in various applications such as access control, ATM card verification and crimi...
Juncao Li, Yong Zhang, Wenhai Kong, Xiamu Niu
ICMCS
2006
IEEE
105views Multimedia» more  ICMCS 2006»
14 years 3 months ago
Embedded Convolutional Face Finder
In this paper, a high-level optimization methodology is applied for the implementation of the well-known Convolutional Face Finder (CFF) algorithm for real-time applications on ce...
Sébastien Roux, Franck Mamalet, Christophe ...
P2P
2006
IEEE
130views Communications» more  P2P 2006»
14 years 3 months ago
The Effect of Replica Placement on Routing Robustness in Distributed Hash Tables
To achieve higher efficiency over their unstructured counterparts, structured peer-to-peer systems hold each node responsible for serving a specified set of keys and correctly r...
Cyrus Harvesf, Douglas M. Blough
W4A
2006
ACM
14 years 2 months ago
Dialog generation for voice browsing
In this paper we present our voice browser system, HearSay, which provides efficient access to the World Wide Web to people with visual disabilities. HearSay includes contentbased...
Zan Sun, Amanda Stent, I. V. Ramakrishnan
MSWIM
2005
ACM
14 years 2 months ago
Adapting WLAN MAC parameters to enhance VoIP call capacity
This work describes a detailed simulation-based study of the performance of an IEEE 802.11e Medium Access Control (MAC) layer over an IEEE 802.11g Physical (PHY) layer. The study ...
Gráinne Hanley, Seán Murphy, Liam Mu...