Sciweavers

256 search results - page 5 / 52
» How iris recognition works
Sort
View
HICSS
2003
IEEE
130views Biometrics» more  HICSS 2003»
14 years 20 days ago
Attack Recognition for System Survivability: A Low-level Approach
This paper extends and builds on previous work that presented a signature-based attack recognition technique. We present general requirements for “survivable attack recognitionâ...
Carol Taylor, Jim Alves-Foss
ICAPR
2009
Springer
14 years 1 months ago
Hierarchical Local Maps for Robust Approximate Nearest Neighbor Computation
In this paper, we propose a novel method for fast nearest neighbors retrieval in non-Euclidean and non-metric spaces. We organize the data into a hierarchical fashion that preserv...
Pratyush Bhatt, Anoop M. Namboodiri
MM
2010
ACM
164views Multimedia» more  MM 2010»
13 years 5 months ago
Visual search applications for connecting published works to digital material
Visual search connects physical (offline) objects with (online) digital media. Using objects from the environment, like newspapers, magazines, books and posters, we can retrieve s...
Jamey Graham, Jorge Moraleda, Jonathan J. Hull, Ti...
IRI
2007
IEEE
14 years 1 months ago
Comparative Analysis of Different Text Segmentation Algorithms on Arabic News Stories
The task of text segmentation represents an important step in many applications and while much work has been carried out to address this task for the English language, work on tex...
Michael A. El-Shayeb, Samhaa R. El-Beltagy, Ahmed ...
ICSE
2009
IEEE-ACM
13 years 5 months ago
Selective backtracking of model changes
Backtracking is necessary when design alternatives are explored or dead ends are reached. Unfortunately, current approaches support chronological backtracking only (undo or versio...
Iris Groher, Alexander Egyed