Sciweavers

368 search results - page 59 / 74
» Computation of Cryptographic Keys from Face Biometrics
Sort
View
GW
2007
Springer
241views Biometrics» more  GW 2007»
14 years 1 months ago
Representation of Human Postures for Vision-Based Gesture Recognition in Real-Time
In this paper, we present a Vision-Based Interface guided by the user gestures. The advantage of our system is that it is built over a motion capture system that recovers the body ...
Antoni Jaume-i-Capó, Javier Varona, Francis...
CCS
2008
ACM
13 years 9 months ago
Multi-use unidirectional proxy re-signatures
In 1998, Blaze, Bleumer, and Strauss suggested a cryptographic primitive termed proxy re-signature in which a proxy transforms a signature computed under Alice's secret key in...
Benoît Libert, Damien Vergnaud
ADAEUROPE
2009
Springer
14 years 2 months ago
An Experience on Ada Programming Using On-Line Judging
Abstract. Ada has proved to be one of the best languages to learn computer programming. Nevertheless, learning to program is difficult and when it is combined with lack of motivati...
Francisco J. Montoya-Dato, José Luis Fern&a...
SIGGRAPH
2003
ACM
14 years 22 days ago
Learning controls for blend shape based realistic facial animation
Blend shape animation is the method of choice for keyframe facial animation: a set of blend shapes (key facial expressions) are used to define a linear space of facial expression...
Pushkar Joshi, Wen C. Tien, Mathieu Desbrun, Frede...
ICMI
2004
Springer
215views Biometrics» more  ICMI 2004»
14 years 26 days ago
Bimodal HCI-related affect recognition
Perhaps the most fundamental application of affective computing would be Human-Computer Interaction (HCI) in which the computer is able to detect and track the user’s affective ...
Zhihong Zeng, Jilin Tu, Ming Liu, Tong Zhang, Nich...