Sciweavers

963 search results - page 48 / 193
» Conditional Digital Signatures
Sort
View
EDBT
2008
ACM
178views Database» more  EDBT 2008»
14 years 8 months ago
Compacting music signatures for efficient music retrieval
Music information retrieval is becoming very important with the ever-increasing growth of music content in digital libraries, peer-to-peer systems and the internet. While it is ea...
Bin Cui, H. V. Jagadish, Beng Chin Ooi, Kian-Lee T...
IMSCCS
2007
IEEE
14 years 3 months ago
Control Flow Checking Algorithm using Soft-based Intra-/Inter-block Assigned-Signature
In radiation environments, alpha particles, cosmic rays and solar wind flux can cause a single event upset (SEU), which is one of the major sources of bit-flips in digital electro...
Yanxia Wu, Guochang Gu, Shaobin Huang, Jun Ni
DPHOTO
2010
208views Hardware» more  DPHOTO 2010»
13 years 10 months ago
A signature analysis based method for elliptical shape
The high level context image analysis regards many fields as face recognition, smile detection, automatic red eye removal, iris recognition, fingerprint verification, etc. Techniq...
Ivana Guarneri, Mirko Guarnera, Giuseppe Messina, ...
CVPR
2004
IEEE
14 years 10 months ago
3D Head Tracking Based on Recognition and Interpolation Using a Time-of-Flight Depth Sensor
This paper describes a head-tracking algorithm that is based on recognition and correlation-based weighted interpolation. The input is a sequence of 3D depth images generated by a...
Carlo Tomasi, Salih Burak Göktürk
ICCD
2007
IEEE
140views Hardware» more  ICCD 2007»
14 years 5 months ago
A low overhead hardware technique for software integrity and confidentiality
Software integrity and confidentiality play a central role in making embedded computer systems resilient to various malicious actions, such as software attacks; probing and tamper...
Austin Rogers, Milena Milenkovic, Aleksandar Milen...