Sciweavers

2315 search results - page 24 / 463
» Does EigenPalm work
Sort
View
IJNSEC
2006
113views more  IJNSEC 2006»
13 years 9 months ago
Cryptanalysis of Park's Authentication Protocol in Wireless Mobile Communication Systems
In 2004, C. Park proposed an authentication protocol to provide user anonymity and untraceability in wireless mobile communication systems. The real user identities are hidden and...
Alberto Peinado Domínguez
MR
2006
74views Robotics» more  MR 2006»
13 years 9 months ago
Lock-in thermal IR imaging using a solid immersion lens
A hemispherical silicon solid immersion lens (SIL) was used to improve the spatial resolution of front-side thermal IR imaging in lock-in mode. The bottom of the SIL was cone-shap...
O. Breitenstein, F. Altmann, T. Riediger, D. Karg,...
PR
2006
131views more  PR 2006»
13 years 9 months ago
A face recognition system based on automatically determined facial fiducial points
In this paper a completely automatic face recognition system is presented. The method works on color images: after having localized the face and the facial features, it determines...
Stefano Arca, Paola Campadelli, Raffaella Lanzarot...
JSW
2007
81views more  JSW 2007»
13 years 9 months ago
Nonblocking Distributed Replication of Versioned Files
— In this paper, we propose a distributed data storage framework that supports unrestricted offline access. The system does not explicitly distinguish between connected and disc...
Lukás Hejtmánek, Ludek Matyska
APAL
2000
90views more  APAL 2000»
13 years 8 months ago
The definable multiplicity property and generic automorphisms
Let T be a strongly minimal theory with quantifier elimination. We show that the class of existentially closed models of T {" is an automorphism"} is an elementary clas...
Hirotaka Kikyo, Anand Pillay