Sciweavers

368 search results - page 64 / 74
» Computation of Cryptographic Keys from Face Biometrics
Sort
View
ICMI
2004
Springer
263views Biometrics» more  ICMI 2004»
14 years 26 days ago
Analysis of emotion recognition using facial expressions, speech and multimodal information
The interaction between human beings and computers will be more natural if computers are able to perceive and respond to human non-verbal communication such as emotions. Although ...
Carlos Busso, Zhigang Deng, Serdar Yildirim, Murta...
AUSAI
2009
Springer
13 years 11 months ago
Classification of EEG for Affect Recognition: An Adaptive Approach
Research on affective computing is growing rapidly and new applications are being developed more frequently. They use information about the affective/mental states of users to adap...
Omar AlZoubi, Rafael A. Calvo, Ronald H. Stevens
GECCO
2009
Springer
148views Optimization» more  GECCO 2009»
13 years 10 months ago
Tracking multiple objects in non-stationary video
One of the key problems in computer vision and pattern recognition is tracking. Multiple objects, occlusion, and tracking moving objects using a moving camera are some of the chal...
Hoang Nguyen, Bir Bhanu
FOCS
2004
IEEE
13 years 11 months ago
Universally Composable Protocols with Relaxed Set-Up Assumptions
A desirable goal for cryptographic protocols is to guarantee security when the protocol is composed with other protocol instances. Universally Composable (UC) protocols provide th...
Boaz Barak, Ran Canetti, Jesper Buus Nielsen, Rafa...
JUCS
2008
156views more  JUCS 2008»
13 years 7 months ago
Efficient k-out-of-n Oblivious Transfer Schemes
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme a...
Cheng-Kang Chu, Wen-Guey Tzeng