Sciweavers

82 search results - page 15 / 17
» Face authentication using a hybrid approach
Sort
View
ECAI
2004
Springer
14 years 1 months ago
Attention-Driven Parts-Based Object Detection
Recent studies have argued that natural vision systems perform classification by utilizing different mechanisms depending on the visual input. In this paper we present a hybrid, ...
Ilkka Autio, Jussi T. Lindgren
PRL
2007
180views more  PRL 2007»
13 years 7 months ago
Symmetric hash functions for secure fingerprint biometric systems
Securing biometrics databases from being compromised is one of the most important challenges that must be overcome in order to demonstrate the viability of biometrics based authen...
Sergey Tulyakov, Faisal Farooq, Praveer Mansukhani...
SRDS
1999
IEEE
13 years 12 months ago
Information Dissemination in Partitionable Mobile Ad Hoc Networks
Ad-hoc wireless networks have no wired component, and may have unpredictable mobility pattern. Such networks can get partitioned and reconnected several times. One possible approa...
Goutham Karumanchi, Srinivasan Muralidharan, Ravi ...
DEON
2008
Springer
13 years 9 months ago
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Nora Cuppens-Boulahia, Frédéric Cupp...
TVLSI
2008
107views more  TVLSI 2008»
13 years 7 months ago
Novel Probabilistic Combinational Equivalence Checking
Exact approaches to combinational equivalence checking, such as automatic test pattern generation-based, binary decision diagrams (BDD)-based, satisfiability-based, and hybrid appr...
Shih-Chieh Wu, Chun-Yao Wang, Yung-Chih Chen