Sciweavers

439 search results - page 65 / 88
» Tongue line extraction
Sort
View
CRYPTO
2011
Springer
180views Cryptology» more  CRYPTO 2011»
12 years 7 months ago
Leakage-Resilient Zero Knowledge
In this paper, we initiate a study of zero knowledge proof systems in the presence of sidechannel attacks. Specifically, we consider a setting where a cheating verifier is allow...
Sanjam Garg, Abhishek Jain 0002, Amit Sahai
ECSA
2011
Springer
12 years 7 months ago
Delta-oriented architectural variability using MontiCore
Modeling of software architectures is a fundamental part of software development processes. Reuse of software components and early analysis of software topologies allow the reduct...
Arne Haber, Thomas Kutz, Holger Rendel, Bernhard R...
ICIP
2005
IEEE
14 years 9 months ago
Shape contexts and Gabor features for face description and authentication
In this paper, we use a robust shape matching algorithm for stablishing correspondences between points from face images, and Gabor vectors (jets) for feature computation. After ex...
Daniel González-Jiménez, José...
OSDI
2008
ACM
14 years 8 months ago
Mining Console Logs for Large-Scale System Problem Detection
The console logs generated by an application contain messages that the application developers believed would be useful in debugging or monitoring the application. Despite the ubiq...
Wei Xu, Ling Huang, Armando Fox, David A. Patterso...
ICMCS
2006
IEEE
311views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Disparity-Based 3D Face Modeling using 3D Deformable Facial Mask for 3D Face Recognition
We present an automatic disparity-based approach for 3D face modeling, from two frontal and one profile view stereo images, for 3D face recognition applications. Once the images a...
A-Nasser Ansari, Mohamed Abdel-Mottaleb, Mohammad ...