Sciweavers

345 search results - page 47 / 69
» When Systems Loose their Identity
Sort
View
ICDAR
2005
IEEE
14 years 3 months ago
An Approach towards Benchmarking of Table Structure Recognition Results
After developing a model free table recognition system we wanted to tune parameters in order to optimize the recognition performance. Therefore we developed a benchmarking environ...
Thomas Kieninger, Andreas Dengel
ACISP
2005
Springer
14 years 3 months ago
Cancelable Key-Based Fingerprint Templates
Biometric based authentication can provide strong security guarantee about the identity of users. Security of biometric data is particularly important as compromise of the data wil...
Russell Ang, Reihaneh Safavi-Naini, Luke McAven
COCOON
2007
Springer
14 years 1 months ago
Scheduling Selfish Tasks: About the Performance of Truthful Algorithms
This paper deals with problems which fall into the domain of selfish scheduling: a protocol is in charge of building a schedule for a set of tasks without directly knowing their l...
George Christodoulou, Laurent Gourvès, Fann...
ICB
2007
Springer
117views Biometrics» more  ICB 2007»
14 years 1 months ago
Curvewise DET Confidence Regions and Pointwise EER Confidence Intervals Using Radial Sweep Methodology
One methodology for evaluating the matching performance of biometric authentication systems is the detection error tradeoff (DET) curve. The DET curve graphically illustrates the r...
Michael E. Schuckers, Yordan Minev, Andy Adler
AAAI
2007
14 years 8 days ago
A Robot That Uses Existing Vocabulary to Infer Non-Visual Word Meanings from Observation
The authors present TWIG, a visually grounded wordlearning system that uses its existing knowledge of vocabulary, grammar, and action schemas to help it learn the meanings of new ...
Kevin Gold, Brian Scassellati