Sciweavers

1018 search results - page 81 / 204
» Remote User Authentication Using Public Information
Sort
View
VLDB
2002
ACM
138views Database» more  VLDB 2002»
13 years 7 months ago
Adaptable Similarity Search using Non-Relevant Information
Many modern database applications require content-based similarity search capability in numeric attribute space. Further, users' notion of similarity varies between search se...
T. V. Ashwin, Rahul Gupta, Sugata Ghosal
ICPR
2008
IEEE
14 years 2 months ago
Online personal identification in night using multiple face representations
This paper details a fully automated face authentication system using low-cost near infrared imaging. The image normalization step consists of eye center localization, scale corre...
Ajay Kumar, T. Srikanth
ICPR
2008
IEEE
14 years 2 months ago
Biomapping: Privacy trustworthy biometrics using noninvertible and discriminable constructions
Biometric authentication and privacy protection are conflicting issues in a practical system. Since biometrics cannot be revoked or canceled if compromised duo to the permanent as...
Jinyang Shi, Zhiyang You, Ming Gu, Kwok-Yan Lam
IRES
2000
71views more  IRES 2000»
13 years 8 months ago
Library Research Seminar II Partners and connections
Although libraries are public spaces in which individuals engage in a range of social and informational activities, few researchers in library and information science use ethnogra...
JCDL
2009
ACM
162views Education» more  JCDL 2009»
14 years 2 months ago
No bull, no spin: a comparison of tags with other forms of user metadata
User-contributed tags have shown promise as a means of indexing multimedia collections by harnessing the combined efforts and enthusiasm of online communities. But tags are only o...
Catherine C. Marshall