Sciweavers

368 search results - page 62 / 74
» Computation of Cryptographic Keys from Face Biometrics
Sort
View
HICSS
2005
IEEE
142views Biometrics» more  HICSS 2005»
14 years 1 months ago
Learning Effectiveness in Web-Based Technology-Mediated Virtual Learning Environment
A framework that delineates the relationships between learner control and learning effectiveness is absent. This study aims to fill this void. Unlike previous research, this study...
Shih-Wei Chou, Chien-Hung Liu
ECCV
2000
Springer
14 years 9 months ago
Divergence-Based Medial Surfaces
The medial surface of a volumetric object is of significant interest for shape analysis. However, its numerical computation can be subtle. Methods based on Voronoi techniques prese...
Sylvain Bouix, Kaleem Siddiqi
FOCS
2004
IEEE
13 years 11 months ago
Shuffling by Semi-Random Transpositions
In the cyclic-to-random shuffle, we are given n cards arranged in a circle. At step k, we exchange the k'th card along the circle with a uniformly chosen random card. The pro...
Elchanan Mossel, Yuval Peres, Alistair Sinclair
CSE
2009
IEEE
14 years 2 months ago
All Friends Are Not Created Equal: An Interaction Intensity Based Approach to Privacy in Online Social Networks
Recent research identifies a growing privacy problem that exists within Online Social Networks (OSNs). Several studies have shown how easily strangers can extract personal data a...
Lerone Banks, Shyhtsun Felix Wu
ICB
2007
Springer
148views Biometrics» more  ICB 2007»
14 years 1 months ago
Walker Recognition Without Gait Cycle Estimation
Abstract. Most of gait recognition algorithms involve walking cycle estimation to accomplish signature matching. However, we may be plagued by two cycle-related issues when develop...
Daoliang Tan, Shiqi Yu, Kaiqi Huang, Tieniu Tan