Sciweavers

78 search results - page 14 / 16
» Identity Verification by Using Handprint
Sort
View
ICCV
2005
IEEE
14 years 9 months ago
Identifying Individuals in Video by Combining "Generative" and Discriminative Head Models
The objective of this work is automatic detection and identification of individuals in unconstrained consumer video, given a minimal number of labelled faces as training data. Whi...
Mark Everingham, Andrew Zisserman
BPM
2009
Springer
126views Business» more  BPM 2009»
14 years 2 days ago
An Integrated Collection of Tools for Continuously Improving the Processes by Which Health Care Is Delivered: A Tool Report
This report will present a collection of tools that supports the precise definition, careful analysis, and execution of processes that coordinate the actions of humans, automated d...
Leon J. Osterweil, Lori A. Clarke, George S. Avrun...
ACNS
2004
Springer
167views Cryptology» more  ACNS 2004»
13 years 11 months ago
A Fully-Functional Group Signature Scheme over Only Known-Order Group
The concept of group signature allows a group member to sign message anonymously on behalf of the group. In the event of a dispute, a designated entity can reveal the identity of a...
Atsuko Miyaji, Kozue Umeda
HICSS
2009
IEEE
179views Biometrics» more  HICSS 2009»
14 years 2 months ago
Understanding Continuance Intention of Knowledge Creation in Online Communities from a Social-Psychological Perspective
Grounded on both social cognitive theory and expectation-disconfirmation theory (EDT), this study aims to investigate how individuals’ continuance intention of knowledge creatio...
Shih-Wei Chou, Ching-Chang Lee, Yu-Chieh Chang, Ch...
CANS
2009
Springer
136views Cryptology» more  CANS 2009»
14 years 2 months ago
Verifying Anonymous Credential Systems in Applied Pi Calculus
Abstract. Anonymous credentials are widely used to certify properties of a credential owner or to support the owner to demand valuable services, while hiding the user’s identity ...
Xiangxi Li, Yu Zhang, Yuxin Deng