Sciweavers

4636 search results - page 821 / 928
» Modelling and Validation with VipTool
Sort
View
ICAI
2004
15 years 5 months ago
Use of Histogram Distances in Iris Authentication
Quantitatively establishing the discriminative power of iris biometric data is considered. Multi-level 2D wavelet transform has been widely used for iris verification system. Whil...
Seung-Seok Choi, Sungsoo Yoon, Sung-Hyuk Cha, Char...
EVENT
2001
267views more  EVENT 2001»
15 years 5 months ago
View-Invariant Representation and Learning of Human Action
Automatically understanding human actions from video sequences is a very challenging problem. This involves the extraction of relevant visual information from a video sequence, re...
Cen Rao, Mubarak Shah
MASCOTS
2004
15 years 5 months ago
Execution-Driven Simulation of Network Storage Systems
A number of new network storage architectures have emerged recently that provide shared, adaptable and high-performance storage systems for dataintensive applications. Three commo...
Yijian Wang, David R. Kaeli
WICSA
2004
15 years 5 months ago
PACE: An Architectural Style for Trust Management in Decentralized Applications
Distributed applications that lack a central, trustworthy authority for control and validation are properly termed decentralized. Multiple, independent agencies, or "partners...
Girish Suryanarayana, Justin R. Erenkrantz, Scott ...
WSCG
2004
232views more  WSCG 2004»
15 years 5 months ago
3D Shape Extraction Using Photographic Tomography with Its Applications
Tomographic imaging is a technique for exploration of a cross-section of an inspected object without destruction. Normally, the input data, known as the projections, are gathered ...
S. Reruang, Withawat Withayachumnankul, Chuchart P...