Sciweavers

853 search results - page 32 / 171
» Flexible authentication of images
Sort
View
WIS
2004
13 years 9 months ago
Inter-domain Authentication and Authorization Mechanisms for Roaming SIP Users
: To enable users to utilize the services of various providers of multimedia services based on the session initiation protocol (SIP), some kind of interaction is required between t...
Dorgham Sisalem, Jiri Kuthan
ICIP
2004
IEEE
14 years 9 months ago
Authentication of MPEG-4-based surveillance video
The industry is currently starting to use MPEG-4 compressed digital video for surveillance applications. The transition from analog to digital video raises difficulties for using ...
Michael Pramateftakis, Tobias Oelbaum, Klaus Diepo...
ICIP
1994
IEEE
14 years 9 months ago
Tomographic Reconstruction Based on Flexible Geometric Models
When dealing with ill-posed inverse problems in data analysis, the Bayesian approach allows one to use prior information to guide the result toward reasonable solutions. In this w...
K. M. Hanson, G. S. Cunningham, G. R. Jennings Jr....
ICIP
2002
IEEE
14 years 9 months ago
Polynomial features for robust face authentication
In this paper we introduce the DCT-mod2 facial feature extraction technique which utilizes polynomial coefficients derived from 2-D DCT coefficients of spatially neighbouring bloc...
Conrad Sanderson, Kuldip K. Paliwal
MICCAI
2008
Springer
14 years 8 months ago
Toward a Flexible and Portable CT Scanner
The very hot and power-hungry x-ray filaments in today's computed tomography (CT) scanners constrain their design to be big and stationary. What if we built a CT scanner that ...
Jeff Orchard, John T. W. Yeow