Sciweavers

368 search results - page 45 / 74
» Computation of Cryptographic Keys from Face Biometrics
Sort
View
ICALP
2005
Springer
14 years 1 months ago
Computational Bounds on Hierarchical Data Processing with Applications to Information Security
Motivated by the study of algorithmic problems in the domain of information security, in this paper, we study the complexity of a new class of computations over a collection of va...
Roberto Tamassia, Nikos Triandopoulos
CVPR
2008
IEEE
14 years 9 months ago
Globally optimal bilinear programming for computer vision applications
We present a practical algorithm that provably achieves the global optimum for a class of bilinear programs commonly arising in computer vision applications. Our approach relies o...
Manmohan Krishna Chandraker, David J. Kriegman
CHI
2009
ACM
14 years 8 months ago
Waterhouse: enabling secure e-mail with social networking
We present Waterhouse, a system for sending and receiving cryptographically protected electronic mail ("secure e-mail"). We show how an existing e-mail interface can be ...
Alex P. Lambert, Stephen M. Bezek, Karrie Karahali...
HICSS
2006
IEEE
131views Biometrics» more  HICSS 2006»
14 years 1 months ago
Understanding Patterns of Technology Evolution: An Ecosystem Perspective
Understanding the dynamics of technology evolution—whether for the purposes of forecasting new product or technology infrastructure developments, or identifying the basis for fu...
Gediminas Adomavicius, Jesse Bockstedt, Alok Gupta...
FGR
2011
IEEE
271views Biometrics» more  FGR 2011»
12 years 11 months ago
Active conditional models
— Matching images with large geometric and iconic changes (e.g. faces under different poses and facial expressions) is an open research problem in computer vision. There are two ...
Ying Chen, Fernando De la Torre