Sciweavers

4636 search results - page 821 / 928
» Modelling and Validation with VipTool
Sort
View
ICAI
2004
13 years 10 months ago
Use of Histogram Distances in Iris Authentication
Quantitatively establishing the discriminative power of iris biometric data is considered. Multi-level 2D wavelet transform has been widely used for iris verification system. Whil...
Seung-Seok Choi, Sungsoo Yoon, Sung-Hyuk Cha, Char...
EVENT
2001
267views more  EVENT 2001»
13 years 10 months ago
View-Invariant Representation and Learning of Human Action
Automatically understanding human actions from video sequences is a very challenging problem. This involves the extraction of relevant visual information from a video sequence, re...
Cen Rao, Mubarak Shah
MASCOTS
2004
13 years 10 months ago
Execution-Driven Simulation of Network Storage Systems
A number of new network storage architectures have emerged recently that provide shared, adaptable and high-performance storage systems for dataintensive applications. Three commo...
Yijian Wang, David R. Kaeli
WICSA
2004
13 years 10 months ago
PACE: An Architectural Style for Trust Management in Decentralized Applications
Distributed applications that lack a central, trustworthy authority for control and validation are properly termed decentralized. Multiple, independent agencies, or "partners...
Girish Suryanarayana, Justin R. Erenkrantz, Scott ...
WSCG
2004
232views more  WSCG 2004»
13 years 10 months ago
3D Shape Extraction Using Photographic Tomography with Its Applications
Tomographic imaging is a technique for exploration of a cross-section of an inspected object without destruction. Normally, the input data, known as the projections, are gathered ...
S. Reruang, Withawat Withayachumnankul, Chuchart P...