Sciweavers

853 search results - page 106 / 171
» Flexible authentication of images
Sort
View
ECIR
1998
Springer
13 years 10 months ago
Content Based Annotation and Retrieval in RAIDER
A new system, RAIDER (Retrieval and Annotation of Image Databases), has been developed for the management of image databases. RAIDER was designed to combat the inadequacies and in...
Stephanie R. Fountain, Tieniu Tan
PAMI
2007
144views more  PAMI 2007»
13 years 8 months ago
Multiplexing for Optimal Lighting
—Imaging of objects under variable lighting directions is an important and frequent practice in computer vision, machine vision, and image-based rendering. Methods for such imagi...
Yoav Y. Schechner, Shree K. Nayar, Peter N. Belhum...
FAST
2009
13 years 6 months ago
Generating Realistic Impressions for File-System Benchmarking
The performance of file systems and related software depends on characteristics of the underlying file-system image (i.e., file-system metadata and file contents). Unfortunately, ...
Nitin Agrawal, Andrea C. Arpaci-Dusseau, Remzi H. ...
ICIP
2004
IEEE
14 years 10 months ago
Estimating the quality of face localization for face verification
Face localization is the process of finding the exact position of a face in a given image. This can be useful in several applications such as face tracking or person authenticatio...
Yann Rodriguez, Fabien Cardinaux, Samy Bengio, Joh...
HIP
2005
Springer
208views Cryptology» more  HIP 2005»
14 years 2 months ago
Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks
In this paper, we propose a new class of Human Interactive Proofs (HIPs) that allow a human to distinguish one computer from another. Unlike traditional HIPs, where the computer is...
Rachna Dhamija, J. D. Tygar