Sciweavers

368 search results - page 52 / 74
» Computation of Cryptographic Keys from Face Biometrics
Sort
View
P2P
2007
IEEE
104views Communications» more  P2P 2007»
14 years 1 months ago
How stable are large superpeer networks against attack?
In this paper, we analyze the stability of large scale superpeer networks against attacks. Two different kinds of attacks namely deterministic and degree dependent attack have bee...
Bivas Mitra, Sujoy Ghose, Niloy Ganguly
ICSE
2001
IEEE-ACM
13 years 12 months ago
Panel: Perspectives on Software Engineering
This panel gives a non-standard view of the future of software engineering. Two of the speakers are recent Ph.D. graduates in computer science, with expertise in software engineer...
David Notkin, Marc Donner, Michael D. Ernst, Micha...
ICMI
2009
Springer
164views Biometrics» more  ICMI 2009»
14 years 2 months ago
GaZIR: gaze-based zooming interface for image retrieval
We introduce GaZIR, a gaze-based interface for browsing and searching for images. The system computes on-line predictions of relevance of images based on implicit feedback, and wh...
László Kozma, Arto Klami, Samuel Kas...
AICT
2008
IEEE
119views Communications» more  AICT 2008»
13 years 7 months ago
Simplification of Frequency Test for Random Number Generation Based on Chi-Square
This paper presents the simplified method of random test suite based on the frequency (block) test. The test is used to check the first property of random numbers which is to have ...
Kruawan Wongpanya, Keattisak Sripimanwat, Kanok Je...
BIOID
2008
135views Biometrics» more  BIOID 2008»
13 years 9 months ago
Multimodal Speaker Identification Based on Text and Speech
Abstract. This paper proposes a novel method for speaker identification based on both speech utterances and their transcribed text. The transcribed text of each speaker's utte...
Panagiotis Moschonas, Constantine Kotropoulos