Sciweavers

4529 search results - page 892 / 906
» Position Based Cryptography
Sort
View
CORR
2010
Springer
120views Education» more  CORR 2010»
13 years 10 months ago
Modeling of 2D and 3D Assemblies Taking Into Account Form Errors of Plane Surfaces
The tolerancing process links the virtual and the real worlds. From the former, tolerances define a variational geometrical language (geometric parameters). From the latter, there...
Serge Samper, Pierre-Antoine Adragna, Hugues Favre...
NECO
2007
127views more  NECO 2007»
13 years 10 months ago
Visual Recognition and Inference Using Dynamic Overcomplete Sparse Learning
We present a hierarchical architecture and learning algorithm for visual recognition and other visual inference tasks such as imagination, reconstruction of occluded images, and e...
Joseph F. Murray, Kenneth Kreutz-Delgado
NETWORK
2007
167views more  NETWORK 2007»
13 years 10 months ago
Sensor Localization under Limited Measurement Capabilities
If we abstract a sensor network as a network graph consisting of vertices and edges, where vertices represent sensor nodes and edges represent distance measurements between neighbo...
Chen Wang, Li Xiao
PAMI
2007
133views more  PAMI 2007»
13 years 10 months ago
Generating Cancelable Fingerprint Templates
—Biometrics-based authentication systems offer obvious usability advantages over traditional password and token-based authentication schemes. However, biometrics raises several p...
Nalini K. Ratha, Sharat Chikkerur, Jonathan H. Con...
CIKM
2010
Springer
13 years 9 months ago
Online learning for recency search ranking using real-time user feedback
Traditional machine-learned ranking algorithms for web search are trained in batch mode, which assume static relevance of documents for a given query. Although such a batch-learni...
Taesup Moon, Lihong Li, Wei Chu, Ciya Liao, Zhaohu...