Sciweavers

1561 search results - page 274 / 313
» Evaluating different methods of microarray data normalizatio...
Sort
View
DICTA
2007
13 years 10 months ago
Biometric Based Cryptographic Key Generation from Faces
Existing asymmetric encryption algorithms require the storage of the secret private key. Stored keys are often protected by poorly selected user passwords that can either be guess...
B. Chen, V. Chandran
WICON
2008
13 years 10 months ago
Constructing accurate, space-efficient, wireless coverage maps for vehicular contexts
Wireless connectivity for vehicles is a fast-growing market, with a plethora of different network technologies already in use. Surveys of the numbers of IEEE 802.11b/g access poin...
David N. Cottingham, Robert K. Harle, Andy Hopper
PICS
2003
13 years 10 months ago
Color Gamut Characterization Via Ray Tracing for Device Profile Generation
Color gamut characterization is an essential step in the ICC profile generation for imaging devices. It is also needed as part of evaluation and comparison of image quality achiev...
Dmitri A. Gusev
CVPR
2010
IEEE
13 years 9 months ago
Free-form mesh tracking: A patch-based approach
In this paper, we consider the problem of tracking nonrigid surfaces and propose a generic data-driven mesh deformation framework. In contrast to methods using strong prior models...
Cedric Cagniart, Edmond Boyer, Slobodan Ilic
IJDE
2002
67views more  IJDE 2002»
13 years 8 months ago
Error, Uncertainty and Loss in Digital Evidence
Despite the potentially grave ramifications of relying on faulty information in the investigative or probabitive stages, the uncertainty in digital evidence is not being evaluated...
Eoghan Casey