Sciweavers

1219 search results - page 164 / 244
» Verification of Equivalent-Results Methods
Sort
View
ECCV
2006
Springer
14 years 12 months ago
Face Authentication Using Adapted Local Binary Pattern Histograms
In this paper, we propose a novel generative approach for face authentication, based on a Local Binary Pattern (LBP) description of the face. A generic face model is considered as ...
Sébastien Marcel, Yann Rodriguez
ICIP
2005
IEEE
14 years 11 months ago
An effective human iris code with low complexity
A human iris coding technique is reported based upon differences in the power spectrum of fragments from normalized iris images. The procedure has been applied to a set of 2174 im...
Donald M. Monro, Dexin Zhang
ICPR
2006
IEEE
14 years 11 months ago
Fingerprint Image Enhancement Based on Skin Profile Approximation
The performance of the fingerprint identification and verification systems relies heavily on the quality of the input fingerprint images. In this paper, we propose an effective im...
Venu Govindaraju, Zhixin Shi
DAC
2008
ACM
14 years 11 months ago
Merging nodes under sequential observability
This paper presents a new type of sequential technology independent synthesis. Building on the previous notions of combinational observability and sequential equivalence, sequenti...
Michael L. Case, Victor N. Kravets, Alan Mishchenk...
DAC
1999
ACM
14 years 11 months ago
Robust FPGA Intellectual Property Protection Through Multiple Small Watermarks
A number of researchers have proposed using digital marks to provide ownership identification for intellectual property. Many of these techniques share three specific weaknesses: ...
John Lach, William H. Mangione-Smith, Miodrag Potk...