Sciweavers

14518 search results - page 64 / 2904
» Two Problems for Sophistication
Sort
View
ICPR
2006
IEEE
14 years 10 months ago
Recognizing Rotated Faces from Two Orthogonal Views in Mugshot Databases
Tolerance to pose variations is one of the key remaining problems in face recognition. It is of great interest in airport surveillance systems using mugshot databases to screen tr...
Xiaozheng Zhang, Yongsheng Gao, Bailing Zhang
ICASSP
2009
IEEE
14 years 3 months ago
Two microphone based direction of arrival estimation for multiple speech sources using spectral properties of speech
A two microphone direction of arrival (DOA) estimation technique for multiple speech sources is developed which exploits speech specific properties, namely sparsity in time-frequ...
Wenyi Zhang, Bhaskar D. Rao
CTRSA
2005
Springer
72views Cryptology» more  CTRSA 2005»
14 years 2 months ago
Proofs for Two-Server Password Authentication
Traditional password-based authentication and key-exchange protocols suffer from the simple fact that a single server stores the sensitive user password. In practice, when such a ...
Michael Szydlo, Burton S. Kaliski Jr.
MPC
2010
Springer
147views Mathematics» more  MPC 2010»
14 years 1 months ago
Designing an Algorithmic Proof of the Two-Squares Theorem
We show a new and constructive proof of the two-squares theorem, based on a somewhat unusual, but very effective, way of rewriting the so-called extended Euclid’s algorithm. Rat...
João F. Ferreira
CRYPTO
2006
Springer
159views Cryptology» more  CRYPTO 2006»
14 years 22 days ago
Asymptotically Optimal Two-Round Perfectly Secure Message Transmission
Abstract. The problem of perfectly secure message transmission concerns two synchronized non-faulty processors sender (S) and receiver (R) that are connected by a synchronous netwo...
Saurabh Agarwal, Ronald Cramer, Robbert de Haan