Sciweavers

469 search results - page 50 / 94
» Two Approaches for a Servomechanism Control System Using Com...
Sort
View
CCS
2005
ACM
14 years 28 days ago
Automated trust negotiation using cryptographic credentials
In automated trust negotiation (ATN), two parties exchange digitally signed credentials that contain attribute information to establish trust and make access control decisions. Be...
Jiangtao Li, Ninghui Li, William H. Winsborough
ISPA
2005
Springer
14 years 27 days ago
Ethernet as a Lossless Deadlock Free System Area Network
The way conventional Ethernet is used today differs in two aspects from how dedicated system area networks are used. Firstly, dedicated system area networks are lossless and only d...
Sven-Arne Reinemo, Tor Skeie
ICCV
2007
IEEE
14 years 1 months ago
Large Lexicon Detection of Sign Language
Abstract. This paper presents an approach to large lexicon sign recognition that does not require tracking. This overcomes the issues of how to accurately track the hands through s...
Helen Cooper, Richard Bowden
ICPR
2008
IEEE
14 years 1 months ago
Score based biometric template selection
A biometric identification procedure usually contains two stages: registration and authentication. Most biometric systems capture multiple samples of the same biometric trait (e.g...
Yong Li, Jianping Yin, En Zhu, Chunfeng Hu, Hui Ch...
ICCV
2011
IEEE
12 years 7 months ago
Color Photometric Stereo for Multicolored Surfaces
We present a multispectral photometric stereo method for capturing geometry of deforming surfaces. A novel photometric calibration technique allows calibration of scenes containin...
Robert Anderson, Bjorn Stenger, Roberto Cipolla