Sciweavers

4250 search results - page 741 / 850
» Understanding the Requirements on Modelling Techniques
Sort
View
AMFG
2005
IEEE
146views Biometrics» more  AMFG 2005»
14 years 3 months ago
A Practical Face Relighting Method for Directional Lighting Normalization
We propose a simplified and practical computational technique for estimating directional lighting in uncalibrated images of faces in frontal pose. We show that this inverse probl...
Kuang-Chih Lee, Baback Moghaddam
EUROCRYPT
2005
Springer
14 years 3 months ago
Secure Remote Authentication Using Biometric Data
Biometric data offer a potential source of high-entropy, secret information that can be used in cryptographic protocols provided two issues are addressed: (1) biometric data are n...
Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafai...
MLMI
2004
Springer
14 years 3 months ago
An Integrated Framework for the Management of Video Collection
Video document retrieval is now an active part of the domain of multimedia retrieval. However, unlike for other media, the management of a collection of video documents adds the pr...
Nicolas Moënne-Loccoz, Bruno Janvier, St&eacu...
SOFTVIS
2003
ACM
14 years 3 months ago
Nice Class Diagrams Admit Good Design?
Analysis and design of programs by using tools has emerged to a standard technique in object-oriented software engineering. Many of these tools claim to implement methods accordin...
Holger Eichelberger
CRYPTO
2001
Springer
152views Cryptology» more  CRYPTO 2001»
14 years 2 months ago
Secure Distributed Linear Algebra in a Constant Number of Rounds
Consider a network of processors among which elements in a finite field K can be verifiably shared in a constant number of rounds. Assume furthermore constant-round protocols ar...
Ronald Cramer, Ivan Damgård