Sciweavers

1601 search results - page 116 / 321
» Locality Preserving Projections
Sort
View
ICB
2007
Springer
156views Biometrics» more  ICB 2007»
14 years 2 months ago
Robust Extraction of Secret Bits from Minutiae
Abstract. Our goal is to extract consistent bits from the same fingerprint in a noisy environment. Such bits can then be used as a secret key in several cryptographic applications...
Ee-Chien Chang, Sujoy Roy
MOBICOM
2004
ACM
14 years 1 months ago
FLSS: a fault-tolerant topology control algorithm for wireless networks
Topology control algorithms usually reduce the number of links in a wireless network, which in turn decreases the degree of connectivity. The resulting network topology is more su...
Ning Li, Jennifer C. Hou
MSS
2000
IEEE
182views Hardware» more  MSS 2000»
14 years 19 days ago
A Blueprint for Representation Information in the OAIS Model
The CEDARS∗ project within UK academia seeks to develop a demonstrator system to recommend techniques for long-term storage of digital data primarily within the research library...
David Holdsworth, Derek M. Sergeant
CLEAR
2006
Springer
102views Biometrics» more  CLEAR 2006»
14 years 1 hour ago
2D Multi-person Tracking: A Comparative Study in AMI Meetings
Abstract. In this paper, we present the findings of the Augmented Multiparty Interaction (AMI) project investigation on the localization and tracking of 2D head positions in meetin...
Kevin Smith, Sascha Schreiber, Igor Potucek, V&iac...
CVPR
2005
IEEE
14 years 10 months ago
A Nonlinear Approach for Face Sketch Synthesis and Recognition
Most face recognition systems focus on photo-based face recognition. In this paper, we present a face recognition system based on face sketches. The proposed system contains two e...
Qingshan Liu, Xiaoou Tang, Hongliang Jin, Hanqing ...