Sciweavers

3571 search results - page 705 / 715
» On the Power of Imperfect Information
Sort
View
PR
2010
179views more  PR 2010»
13 years 7 months ago
Robust palmprint verification using 2D and 3D features
This paper presents a new personal authentication system that simultaneously exploits 2D and 3D palmprint features. The objective of our work is to improve accuracy and robustness...
David Zhang, Vivek Kanhangad, Nan Luo, Ajay Kumar
PRL
2010
188views more  PRL 2010»
13 years 7 months ago
Sparsity preserving discriminant analysis for single training image face recognition
: Single training image face recognition is one of main challenges to appearance-based pattern recognition techniques. Many classical dimensionality reduction methods such as LDA h...
Lishan Qiao, Songcan Chen, Xiaoyang Tan
TCOM
2010
119views more  TCOM 2010»
13 years 7 months ago
Optimization of OFDMA-Based Cellular Cognitive Radio Networks
Abstract— In this paper, we study the coexistence and optimization of a multicell cognitive radio network (CRN) which is overlaid with a multicell primary radio network (PRN). We...
Yao Ma, Dong In Kim, Zhiqiang Wu
TCS
2010
13 years 7 months ago
Canonical finite state machines for distributed systems
There has been much interest in testing from finite state machines (FSMs) as a result of their suitability for modelling or specifying state-based systems. Where there are multip...
Robert M. Hierons
TKDE
2010
158views more  TKDE 2010»
13 years 7 months ago
Voting Systems with Trust Mechanisms in Cyberspace: Vulnerabilities and Defenses
—With the popularity of voting systems in cyberspace, there are growing evidence that the current voting systems can be manipulated by fake votes. This problem has attracted many...
Qinyuan Feng, Yan Lindsay Sun, Ling Liu, Yafei Yan...