Sciweavers

368 search results - page 68 / 74
» Computation of Cryptographic Keys from Face Biometrics
Sort
View
OTM
2010
Springer
13 years 5 months ago
Measuring Software Systems Scalability for Proactive Data Center Management
The current trend of increasingly larger Web-based applications makes scalability the key challenge when developing, deploying, and maintaining data centers. At the same time, the ...
Nuno A. Carvalho, José Pereira
POLICY
2007
Springer
14 years 1 months ago
Proteus: A Semantic Context-Aware Adaptive Policy Model
The growing diffusion of portable devices enables users to benefit from anytime and anywhere impromptu collaboration. Appropriate policy models that take into account the dynamici...
Alessandra Toninelli, Rebecca Montanari, Lalana Ka...
ICMI
2005
Springer
136views Biometrics» more  ICMI 2005»
14 years 29 days ago
Contextual recognition of head gestures
Head pose and gesture offer several key conversational grounding cues and are used extensively in face-to-face interaction among people. We investigate how dialog context from an ...
Louis-Philippe Morency, Candace L. Sidner, Christo...
BMCBI
2011
12 years 11 months ago
Conotoxin Protein Classification Using Free Scores of Words and Support Vector Machines
Background: Conotoxin has been proven to be effective in drug design and could be used to treat various disorders such as schizophrenia, neuromuscular disorders and chronic pain. ...
Nazar Zaki, Stefan Wolfsheimer, Grégory Nue...
SIGGRAPH
1996
ACM
13 years 11 months ago
Blue Screen Matting
A classical problem of imaging--the matting problem--is separation of a non-rectangular foreground image from a (usually) rectangular background image--for example, in a film fram...
Alvy Ray Smith, James F. Blinn