Sciweavers

12673 search results - page 2431 / 2535
» Learning while designing
Sort
View
ICPR
2010
IEEE
14 years 1 months ago
Detecting Altered Fingerprints
Abstract--The widespread deployment of Automated Fingerprint Identification Systems (AFIS) in law enforcement and border control applications has heightened the need for ensuring t...
Jianjiang Feng, Anil Jain, Arun Ross
CRYPTO
2000
Springer
134views Cryptology» more  CRYPTO 2000»
14 years 1 months ago
Taming the Adversary
Abstract. While there is a great deal of sophistication in modern cryptology, simple (and simplistic) explanations of cryptography remain useful and perhaps necessary. Many of the ...
Martín Abadi
DIALM
1999
ACM
150views Algorithms» more  DIALM 1999»
14 years 1 months ago
Mobile computing in next generation wireless networks
In this paper, we attempt to describe the evolving status of wireless communications and its impact on the future of mobile computing. We present a historical perspective and eluc...
Prathima Agrawal, David Famolari
ICMCS
1999
IEEE
150views Multimedia» more  ICMCS 1999»
14 years 1 months ago
DIVeR: A Dynamic Interactive Video Retrieval Protocol for Disk Array Based Servers
Video-on-demand (VOD) is a very promising multimedia application of the near future. In order for such a service to be commercially viable, efficient storage and retrieval schemes...
Senthil Sengodan, Victor O. K. Li
INFOCOM
1999
IEEE
14 years 1 months ago
Enhancing Survivability of Mobile Internet Access Using Mobile IP with Location Registers
The Mobile IP (MIP) protocol for IP version 4 provides continuous Internet connectivity to mobile hosts. However, currently it has some drawbacks in the areas of survivability, per...
Ravi Jain, Thomas Raleigh, Danny Yang, Li-Fung Cha...
« Prev « First page 2431 / 2535 Last » Next »