Sciweavers

390 search results - page 6 / 78
» Use It or Lose It
Sort
View
ICDAR
2003
IEEE
14 years 1 months ago
On-line Signature Verification Using Local Shape Analysis
This paper presents a novel approach to the on-line signature verification using local shape Analysis. First, segment the input signature into several segments using HMM (Hidden M...
Mingfu Zou, Jianjun Tong, Changping Liu, Zhenglian...
DAGSTUHL
2008
13 years 9 months ago
Fast (Parallel) Dense Linear System Solvers in C-XSC Using Error Free Transformations and BLAS
Existing selfverifying solvers for dense linear (interval-)systems in C-XSC provide high accuracy, but are rather slow. A new set of solvers is presented, which are a lot faster th...
Walter Krämer, Michael Zimmer
DICTA
2003
13 years 9 months ago
Fast Circle Detection Using Gradient Pair Vectors
The Circle Hough Transform (CHT) has become a common method for circle detection in numerous image processing applications. Because of its drawbacks, various modifications to the b...
Ali Ajdari Rad, Karim Faez, Navid Qaragozlou
ICISC
2003
115views Cryptology» more  ICISC 2003»
13 years 9 months ago
Receipt-Free Electronic Auction Schemes Using Homomorphic Encryption
Bid-rigging is a dangerous attack in electronic auction. Abe and Suzuki firstly introduced the idea of receipt-free to prevent this attack. In this paper we point out that Abe and...
Xiaofeng Chen, Byoungcheon Lee, Kwangjo Kim
CAL
2002
13 years 7 months ago
Implementing Decay Techniques using 4T Quasi-Static Memory Cells
Abstract-This paper proposes the use of four-transistor (4T) cache and branch predictor array cell designs to address increasing worries regarding leakage power dissipation. While ...
Philo Juang, Phil Diodato, Stefanos Kaxiras, Kevin...