Sciweavers

1064 search results - page 194 / 213
» Cryptography from Anonymity
Sort
View
TIFS
2008
129views more  TIFS 2008»
13 years 9 months ago
On Empirical Recognition Capacity of Biometric Systems Under Global PCA and ICA Encoding
Performance of biometric-based recognition systems depends on various factors: database quality, image preprocessing, encoding techniques, etc. Given a biometric database and a se...
Natalia A. Schmid, Francesco Nicolo
MANSCI
2007
102views more  MANSCI 2007»
13 years 9 months ago
Implications of Renegotiation for Optimal Contract Flexibility and Investment
After entering into supply contracts, firms often later renegotiate the terms of those contracts. For example, firms that obtain market demand information after signing supply c...
Erica L. Plambeck, Terry A. Taylor
NN
2007
Springer
13 years 8 months ago
Perception through visuomotor anticipation in a mobile robot
Several scientists suggested that certain perceptual qualities are based on sensorimotor anticipation: for example, the softness of a sponge is perceived by anticipating the sensa...
Heiko Hoffmann
JAT
2010
109views more  JAT 2010»
13 years 7 months ago
Networks of polynomial pieces with application to the analysis of point clouds and images
We consider H¨older smoothness classes of surfaces for which we construct piecewise polynomial approximation networks, which are graphs with polynomial pieces as nodes and edges ...
Ery Arias-Castro, Boris Efros, Ofer Levi
SENSYS
2010
ACM
13 years 7 months ago
Cooperative transit tracking using smart-phones
Real-time transit tracking is gaining popularity as a means for transit agencies to improve the rider experience. However, many transit agencies lack either the funding or initiat...
Arvind Thiagarajan, James Biagioni, Tomas Gerlich,...