Sciweavers

632 search results - page 113 / 127
» Two Facets of Authentication
Sort
View
MICCAI
2010
Springer
13 years 7 months ago
Understanding the Optics to Aid Microscopy Image Segmentation
Abstract. Image segmentation is essential for many automated microscopy image analysis systems. Rather than treating microscopy images as general natural images and rushing into th...
Zhaozheng Yin, Kang Li, Takeo Kanade, Mei Chen
SCN
2010
Springer
142views Communications» more  SCN 2010»
13 years 7 months ago
How to Pair with a Human
We introduce a protocol, that we call Human Key Agreement, that allows pairs of humans to establish a key in a (seemingly hopeless) case where no public-key infrastructure is avail...
Stefan Dziembowski
TMC
2010
109views more  TMC 2010»
13 years 7 months ago
Uncertainty Modeling and Reduction in MANETs
—Evaluating and quantifying trust stimulates collaboration in mobile ad hoc networks (MANETs). Many existing reputation systems sharply divide the trust value into right or wrong...
Feng Li, Jie Wu
VR
2010
IEEE
188views Virtual Reality» more  VR 2010»
13 years 7 months ago
Illuminating the past: state of the art
Virtual reconstruction and representation of historical environments and objects have been of research interest for nearly two decades. Physically-based and historically accurate ...
Jassim Happa, Mark Mudge, Kurt Debattista, Alessan...
ICIP
2010
IEEE
13 years 6 months ago
Randomly driven fuzzy key extraction of unclonable images
In this paper, we develop an adjustable Fuzzy Extractor using the Physical Unclonable Functions (PUF) obtained by a common laser engraving method to sign physical objects. In part...
Saloomeh Shariati, Laurent Jacques, Françoi...