Sciweavers

2125 search results - page 206 / 425
» Points with Type-2 Operations
Sort
View
DAGM
2006
Springer
15 years 6 months ago
Introducing Dynamic Prior Knowledge to Partially-Blurred Image Restoration
Abstract. The paper presents an unsupervised method for partiallyblurred image restoration without influencing unblurred regions or objects. Maximum a posteriori estimation of para...
Hongwei Zheng, Olaf Hellwich
BIOID
2008
190views Biometrics» more  BIOID 2008»
15 years 5 months ago
Direct Attacks Using Fake Images in Iris Verification
Abstract. In this contribution, the vulnerabilities of iris-based recognition systems to direct attacks are studied. A database of fake iris images has been created from real iris ...
Virginia Ruiz-Albacete, Pedro Tome-Gonzalez, Ferna...
COMPGEOM
2008
ACM
15 years 5 months ago
Arrangements of geodesic arcs on the sphere
This movie illustrates exact construction and maintenance of arrangements induced by arcs of great circles embedded on the sphere, also known as geodesic arcs, and exact computati...
Efi Fogel, Ophir Setter, Dan Halperin
EDBT
2008
ACM
170views Database» more  EDBT 2008»
15 years 5 months ago
Managing virtual money for satisfaction and scale up in P2P systems
In peer-to-peer data management systems query allocation is a critical issue for the good operation of the system. This task is challenging because participants may prefer to perf...
Jorge-Arnulfo Quiané-Ruiz, Philippe Lamarre...
ESORICS
2008
Springer
15 years 5 months ago
CPU Bugs, CPU Backdoors and Consequences on Security
In this paper, we present the security implications of x86 processor bugs or backdoors on operating systems and virtual machine monitors. We will not try to determine whether the b...
Loïc Duflot