Sciweavers

2604 search results - page 328 / 521
» Human Errors and System Requirements
Sort
View
CCS
2004
ACM
14 years 2 months ago
KNOW Why your access was denied: regulating feedback for usable security
We examine the problem of providing useful feedback about access control decisions to users while controlling the disclosure of the system’s security policies. Relevant feedback...
Apu Kapadia, Geetanjali Sampemane, Roy H. Campbell
FPGA
2006
ACM
195views FPGA» more  FPGA 2006»
14 years 26 days ago
An adaptive Reed-Solomon errors-and-erasures decoder
The development of Reed-Solomon (RS) codes has allowed for improved data transmission over a variety of communication media. Although Reed-Solomon decoding provides a powerful def...
Lilian Atieno, Jonathan Allen, Dennis Goeckel, Rus...
ETT
2007
90views Education» more  ETT 2007»
13 years 9 months ago
Algorithms and applications of channel impulse response length estimation for MIMO-OFDM
Abstract— The performance of the widely applied timedomain channel estimation for SISO- and MIMO-OFDM systems strongly depends on the preciseness of information regarding maximum...
Marco Krondorf, Ting-Jung Liang, M. Goblirsch, Ger...
CVPR
2004
IEEE
14 years 11 months ago
Learning Methods for Generic Object Recognition with Invariance to Pose and Lighting
We assess the applicability of several popular learning methods for the problem of recognizing generic visual categories with invariance to pose, lighting, and surrounding clutter...
Fu Jie Huang, Léon Bottou, Yann LeCun
AC
2003
Springer
14 years 26 days ago
Influence of Location over Several Classifiers in 2D and 3D Face Verification
In this paper two methods for human face recognition and the influence of location mistakes are shown. First one, Principal Components Analysis (PCA), has been one of the most appl...
Susana Mata, Cristina Conde, Araceli Sánche...