Sciweavers

1027 search results - page 70 / 206
» Better Correspondence by Registration
Sort
View
CHES
2009
Springer
140views Cryptology» more  CHES 2009»
14 years 9 months ago
On Tamper-Resistance from a Theoretical Viewpoint
Tamper-proof devices are pretty powerful. They can be used to have better security in applications. In this work we observe that they can also be maliciously used in order to defea...
Paulo Mateus, Serge Vaudenay
PERCOM
2005
ACM
14 years 8 months ago
Adaptive Location Management Scheme for Mobile IP
Mobile IP is a common standard to support global mobility of mobile hosts (MHs). One of the major problems for the Mobile IP is frequent location update and high signaling overhea...
Ha Won Kim, Sung Je Hong, Jong Kim
ICIP
2008
IEEE
14 years 3 months ago
Multispectral palm image fusion for accurate contact-free palmprint recognition
In this paper, we propose to improve the verification performance of contract-free palmprint recognition system by means of feature-level image registration and pixel-level fusio...
Ying Hao, Zhenan Sun, Tieniu Tan, Chao Ren
ECCV
2010
Springer
13 years 6 months ago
Video Synchronization Using Temporal Signals from Epipolar Lines
Time synchronization of video sequences in a multi-camera system is necessary for successfully analyzing the acquired visual information. Even if synchronization is established, it...
Dmitry Pundik, Yael Moses
OOPSLA
2007
Springer
14 years 3 months ago
The transactional memory / garbage collection analogy
This essay presents remarkable similarities between transactional memory and garbage collection. The connections are fascinating in their own right, and they let us better underst...
Dan Grossman