Sciweavers

77 search results - page 14 / 16
» Identity Management in Face Recognition Systems
Sort
View
CVPR
2004
IEEE
14 years 9 months ago
Fast, Integrated Person Tracking and Activity Recognition with Plan-View Templates from a Single Stereo Camera
Copyright 2004 IEEE. Published in Conference on Computer Vision and Pattern Recognition (CVPR-2004), June 27 - July 2, 2004, Washington DC. Personal use of this material is permit...
Michael Harville, Dalong Li
QUACON
2009
Springer
14 years 1 months ago
A Context Quality Model to Support Transparent Reasoning with Uncertain Context
Much research on context quality in context-aware systems divides into two strands: (1) the qualitative identication of quality measures and (2) the use of uncertain reasoning tec...
Susan McKeever, Juan Ye, Lorcan Coyle, Simon Dobso...
DAC
2005
ACM
14 years 8 months ago
Efficient fingerprint-based user authentication for embedded systems
User authentication, which refers to the process of verifying the identity of a user, is becoming an important security requirement in various embedded systems. While conventional...
Pallav Gupta, Srivaths Ravi, Anand Raghunathan, Ni...
ICMB
2006
IEEE
102views Business» more  ICMB 2006»
14 years 1 months ago
Card-based Macropayment for Mobile Phones
Most new entrants into the mobile commerce marketplace are faced with a paradox; how can we attract users without merchants, and how can we attract merchants without customers? Wi...
Philip Garner, Reuben Edwards, Paul Coulton
CORR
2006
Springer
206views Education» more  CORR 2006»
13 years 7 months ago
ANAP: Anonymous Authentication Protocol in Mobile Ad hoc Networks
The pervasiveness of wireless communication recently gave mobile ad hoc networks (MANET) a significant researcher's attention, due to its innate capabilities of instant commu...
Tomasz Ciszkowski, Zbigniew Kotulski