Sciweavers

1375 search results - page 89 / 275
» eg 2006
Sort
View
PRL
2002
142views more  PRL 2002»
13 years 7 months ago
Matching of palmprints
This paper investigates the feasibility of person identification based on feature points extracted from palmprint images. Our approach first extracts a set of feature points along...
Nicolae Duta, Anil K. Jain, Kanti V. Mardia
COGSCI
2006
56views more  COGSCI 2006»
13 years 8 months ago
Phonotactics and Articulatory Coordination Interact in Phonology: Evidence from Nonnative Production
A core area of phonology is the study of phonotactics, or how sounds are linearly combined. Recent cross-linguistic analyses have shown that the phonology determines not only phon...
Lisa Davidson
IJCV
2007
196views more  IJCV 2007»
13 years 8 months ago
Weakly Supervised Scale-Invariant Learning of Models for Visual Recognition
We investigate a method for learning object categories in a weakly supervised manner. Given a set of images known to contain the target category from a similar viewpoint, learning...
Robert Fergus, Pietro Perona, Andrew Zisserman
JCSS
2006
56views more  JCSS 2006»
13 years 8 months ago
Determining model accuracy of network traces
Accurate network modeling is critical to the design of network protocols. Traditional modeling approaches, such as Discrete Time Markov Chains (DTMC) are limited in their ability ...
Almudena Konrad, Ben Y. Zhao, Anthony D. Joseph
ACNS
2005
Springer
116views Cryptology» more  ACNS 2005»
14 years 1 months ago
Two-Server Password-Only Authenticated Key Exchange
Typical protocols for password-based authentication assume a single server which stores all the information (e.g., the password) necessary to authenticate a user. Unfortunately, a...
Jonathan Katz, Philip D. MacKenzie, Gelareh Taban,...