Sciweavers

253 search results - page 39 / 51
» Imperative self-adjusting computation
Sort
View
AVBPA
2005
Springer
282views Biometrics» more  AVBPA 2005»
14 years 1 months ago
Secure Fingerprint Matching with External Registration
Biometrics-based authentication systems offer enhanced security and user convenience compared to traditional token-based (e.g., ID card) and knowledge-based (e.g., password) system...
James Reisman, Umut Uludag, Arun Ross
ESOP
2005
Springer
14 years 1 months ago
Forward Slicing by Conjunctive Partial Deduction and Argument Filtering
Program slicing is a well-known methodology that aims at identifying the program statements that (potentially) affect the values computed at some point of interest. Within imperat...
Michael Leuschel, Germán Vidal
ICN
2005
Springer
14 years 1 months ago
Failover for Mobile Routers: A Vision of Resilient Ambience
The ambient networking approach includes the flexibility of every end system to be not just a node but also an entire network. The end user entities are, in the majority of use cas...
Eranga Perera, Aruna Seneviratne, Roksana Boreli, ...
PCM
2005
Springer
107views Multimedia» more  PCM 2005»
14 years 1 months ago
Auto-summarization of Multimedia Meeting Records Based on Accessing Log
Abstract. Computer techniques have been leveraged to record human experiences in many public spaces, e.g. meeting rooms and classrooms. For the large amount of such records produce...
Weisheng He, Yuanchun Shi, Xin Xiao
ASIASIM
2004
Springer
14 years 1 months ago
Intuitive Control of Dynamic Simulation Using Improved Implicit Constraint Enforcement
Geometric constraints are imperative components of many dynamic simulation systems to effectively control the behavior of simulated objects. In this paper we present an improved fi...
Min Hong, Samuel W. J. Welch, Min-Hyung Choi