Sciweavers

78 search results - page 12 / 16
» Identity Verification by Using Handprint
Sort
View
DAC
2003
ACM
14 years 8 months ago
Symbolic representation with ordered function templates
Binary Decision Diagrams (BDDs) often fail to exploit sharing between Boolean functions that differ only in their support variables. In a memory circuit, for example, the function...
Amit Goel, Gagan Hasteer, Randal E. Bryant
SEW
2006
IEEE
14 years 1 months ago
Pseudo-Exhaustive Testing for Software
Pseudo-exhaustive testing uses the empirical observation that, for broad classes of software, a fault is likely triggered by only a few variables interacting. The method takes adv...
D. Richard Kuhn, Vadim Okun
CVPR
2008
IEEE
14 years 9 months ago
Online learning of patch perspective rectification for efficient object detection
For a large class of applications, there is time to train the system. In this paper, we propose a learning-based approach to patch perspective rectification, and show that it is b...
Stefan Hinterstoisser, Selim Benhimane, Nassir Nav...
PR
2008
137views more  PR 2008»
13 years 7 months ago
Cancellable biometrics and annotations on BioHash
Lately, the once powerful one-factor authentication which is based solely on either password, token or biometric approach, appears to be insufficient in addressing the challenges ...
Andrew Beng Jin Teoh, Yip Wai Kuan, Sangyoun Lee
ICIP
2002
IEEE
14 years 9 months ago
Polynomial features for robust face authentication
In this paper we introduce the DCT-mod2 facial feature extraction technique which utilizes polynomial coefficients derived from 2-D DCT coefficients of spatially neighbouring bloc...
Conrad Sanderson, Kuldip K. Paliwal