Sciweavers

42230 search results - page 8400 / 8446
» Algorithms and Complexity Results for
Sort
View
PAMI
2007
133views more  PAMI 2007»
13 years 8 months ago
Generating Cancelable Fingerprint Templates
—Biometrics-based authentication systems offer obvious usability advantages over traditional password and token-based authentication schemes. However, biometrics raises several p...
Nalini K. Ratha, Sharat Chikkerur, Jonathan H. Con...
PAMI
2007
219views more  PAMI 2007»
13 years 8 months ago
Shape Estimation Using Polarization and Shading from Two Views
—This paper presents a novel method for 3D surface reconstruction that uses polarization and shading information from two views. The method relies on the polarization data acquir...
Gary Atkinson, Edwin R. Hancock
PR
2007
109views more  PR 2007»
13 years 8 months ago
Unsupervised multiscale oil slick segmentation from SAR images using a vector HMC model
This study focuses on the segmentation and characterization of oil slicks on the sea surface from synthetic aperture radar (SAR) observations. In fact, an increase in viscosity du...
Stéphane Derrode, Grégoire Mercier
PUC
2007
154views more  PUC 2007»
13 years 8 months ago
Point-of-capture archiving and editing of personal experiences from a mobile device
Personal experience computing is an emerging research area in computing support for capturing, archiving, editing, and utilizing of digital personal experiences. This paper presen...
Chon-in Wu, Chao-ming Teng, Yi-Chao Chen, Tung-yun...
SAC
2008
ACM
13 years 8 months ago
Removing useless variables in cost analysis of Java bytecode
Automatic cost analysis has interesting applications in the context of verification and certification of mobile code. For instance, the code receiver can use cost information in o...
Elvira Albert, Puri Arenas, Samir Genaim, Germ&aac...
« Prev « First page 8400 / 8446 Last » Next »