Sciweavers

6952 search results - page 1327 / 1391
» The information integrity imperative
Sort
View
WACV
2005
IEEE
14 years 1 months ago
Deformation Analysis for 3D Face Matching
Current two-dimensional image based face recognition systems encounter difficulties with large facial appearance variations due to the pose, illumination and expression changes. ...
Xiaoguang Lu, Anil K. Jain
MM
2005
ACM
167views Multimedia» more  MM 2005»
14 years 1 months ago
Evaluation axes for medical image retrieval systems: the imageCLEF experience
Content–based image retrieval in the medical domain is an extremely hot topic in medical imaging as it promises to help better managing the large amount of medical images being ...
Henning Müller, Paul Clough, William R. Hersh...
SAC
2005
ACM
14 years 1 months ago
A complex biological database querying method
Many biological information systems rely on relational database management systems (RDBMS) to manage high-throughput biological data. While keeping these data well archived, organ...
Jake Yue Chen, John V. Carlis, Ning Gao
SACMAT
2005
ACM
14 years 1 months ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang
UIST
2005
ACM
14 years 1 months ago
Automation and customization of rendered web pages
On the desktop, an application can expect to control its user interface down to the last pixel, but on the World Wide Web, a content provider has no control over how the client wi...
Michael Bolin, Matthew Webber, Philip Rha, Tom Wil...
« Prev « First page 1327 / 1391 Last » Next »