Sciweavers

1610 search results - page 259 / 322
» Identity Based Multisignatures
Sort
View
COST
2009
Springer
178views Multimedia» more  COST 2009»
14 years 1 months ago
Fusion of Movement Specific Human Identification Experts
Abstract. In this paper a multi-modal method for human identification that exploits the discriminant features derived from several movement types performed from the same human is p...
Nikolaos Gkalelis, Anastasios Tefas, Ioannis Pitas
ICDCS
2010
IEEE
14 years 1 months ago
A New Buffer Cache Design Exploiting Both Temporal and Content Localities
: This paper presents a Least Popularly Used buffer cache algorithm to exploit both temporal locality and content locality of I/O requests. Popular data blocks are selected as refe...
Jin Ren, Qing Yang
HOTOS
2007
IEEE
14 years 1 months ago
Hyperspaces for Object Clustering and Approximate Matching in Peer-to-Peer Overlays
Existing distributed hash tables provide efficient mechanisms for storing and retrieving a data item based on an exact key, but are unsuitable when the search key is similar, but ...
Bernard Wong, Ymir Vigfusson, Emin Gün Sirer
ICB
2007
Springer
117views Biometrics» more  ICB 2007»
14 years 1 months ago
Curvewise DET Confidence Regions and Pointwise EER Confidence Intervals Using Radial Sweep Methodology
One methodology for evaluating the matching performance of biometric authentication systems is the detection error tradeoff (DET) curve. The DET curve graphically illustrates the r...
Michael E. Schuckers, Yordan Minev, Andy Adler
ICB
2007
Springer
121views Biometrics» more  ICB 2007»
14 years 1 months ago
SVDD-Based Illumination Compensation for Face Recognition
Illumination change is one of most important and difficult problems which prevent from applying face recognition to real applications. For solving this, we propose a method to comp...
Sang-Woong Lee, Seong-Whan Lee