Sciweavers

196 search results - page 26 / 40
» Person Identification using Electrocardiograms
Sort
View
SRDS
2010
IEEE
13 years 5 months ago
An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing
Entities (e.g., users, services) have to authenticate themselves to service providers (SPs) in order to use their services. An entity provides personally identifiable information (...
Pelin Angin, Bharat K. Bhargava, Rohit Ranchal, No...
GIS
2005
ACM
14 years 8 months ago
Close pair queries in moving object databases
Databases of moving objects are important for air traffic control, ground traffic, and battlefield configurations. We introduce the (historical and spatial) range close-pair query...
Panfeng Zhou, Donghui Zhang, Betty Salzberg, Gene ...
WIMOB
2008
IEEE
14 years 2 months ago
A Multi-Sensing-Range Method for Position Estimation of Passive RFID Tags
— Recently, the RFID tag system is paid attention to as an identification source. Each RFID tag is attached to some object. With the unique ID of RFID tag, a user identifies the ...
Toshihiro Hori, Tomotaka Wada, Yuuki Ota, Norie Uc...
MVA
2002
188views Computer Vision» more  MVA 2002»
13 years 7 months ago
Adaptive Background Estimation for Object Tracking
2 Adaptive Background Model Tracking people has received considerable attention by computer vision researchers. Interest is motivated by the broad range of potential applications s...
Ryunosuke Itoh, Yoshio Iwai, Masahiko Yachida
WWW
2006
ACM
14 years 8 months ago
Retroactive answering of search queries
Major search engines currently use the history of a user's actions (e.g., queries, clicks) to personalize search results. In this paper, we present a new personalized service...
Beverly Yang, Glen Jeh