Sciweavers

1610 search results - page 33 / 322
» Identity Based Multisignatures
Sort
View
ECCV
2006
Springer
14 years 10 months ago
Multivalued Default Logic for Identity Maintenance in Visual Surveillance
Recognition of complex activities from surveillance video requires detection and temporal ordering of its constituent "atomic" events. It also requires the capacity to ro...
Vinay D. Shet, David Harwood, Larry S. Davis
IJMTM
2011
190views more  IJMTM 2011»
13 years 3 months ago
Exact and heuristic approaches for lot splitting and scheduling on identical parallel machines
: In this paper, we address a lot splitting and scheduling problem existent in a textile factory. The factory we study produces a set of products that are made of, or assembled fro...
Carina Pimentel, Filipe Pereira Alvelos, Antonio D...
MM
2006
ACM
209views Multimedia» more  MM 2006»
14 years 2 months ago
Automatic detection of player's identity in soccer videos using faces and text cues
In soccer videos, most significant actions are usually followed by close–up shots of players that take part in the action itself. Automatically annotating the identity of the p...
Marco Bertini, Alberto Del Bimbo, Walter Nunziati
ICB
2007
Springer
195views Biometrics» more  ICB 2007»
14 years 11 days ago
Identity Verification by Using Handprint
In recent years, palmprint based personal identification has been extensively explored by researchers. The success of this technology has demonstrated that the inner part of palm s...
Ying Hao, Tieniu Tan, Zhenan Sun, Yufei Han
BIOSIG
2008
159views Biometrics» more  BIOSIG 2008»
13 years 10 months ago
TLS-Federation - a Secure and Relying-Party-Friendly Approach for Federated Identity Management
: Federated Single-Sign-On using web browsers as User Agents becomes increasingly important. However, current proposals require substantial changes in the implementation of the Rel...
Bud P. Bruegger, Detlef Hühnlein, Jörg S...