Sciweavers

438 search results - page 50 / 88
» Projective Coordinates Leak
Sort
View
CSCW
2000
ACM
14 years 2 months ago
Collaboration with Lean Media: how open-source software succeeds
Open-source software, usually created by volunteer programmers dispersed worldwide, now competes with that developed by software firms. This achievement is particularly impressive...
Yutaka Yamauchi, Makoto Yokozawa, Takeshi Shinohar...
ICB
2007
Springer
238views Biometrics» more  ICB 2007»
14 years 1 months ago
Keypoint Identification and Feature-Based 3D Face Recognition
We present a feature-based 3D face recognition algorithm and propose a keypoint identification technique which is repeatable and identifies keypoints where shape variation is high ...
Ajmal S. Mian, Mohammed Bennamoun, Robyn A. Owens
APCHI
2004
IEEE
14 years 1 months ago
Our Ubiquitous Computing Home Inside: A Practical Approach Emerging into House and Home
To make practical ubiquitous computing environment for everyday activities especially for house and home, the environment has to be proactively managed by the users at home themsel...
Soichiro Iga, Saiko Ohno
CANS
2006
Springer
129views Cryptology» more  CANS 2006»
14 years 1 months ago
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields
Pairings on elliptic curves have been used as cryptographic primitives for the development of new applications such as identity based schemes. For the practical applications, it is...
Tae-Hyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Ho Wo...
ENC
2004
IEEE
14 years 1 months ago
On the Hardware Design of an Elliptic Curve Cryptosystem
We present a hardware architecture for an Elliptic Curve Cryptography System performing the three basic cryptographic schemes: DH key generation, encryption and digital signature....
Miguel Morales-Sandoval, Claudia Feregrino Uribe