Sciweavers

12753 search results - page 2374 / 2551
» is 2002
Sort
View
148
Voted
ICAPR
2005
Springer
15 years 9 months ago
Fingerprint Image Enhancement Using STFT Analysis
Contrary to popular belief, despite decades of research in fingerprints, reliable fingerprint recognition is an open problem. Extracting features out of poor quality prints is t...
Sharat Chikkerur, Venu Govindaraju, Alexander N. C...
163
Voted
INDOCRYPT
2005
Springer
15 years 9 months ago
On the Algebraic Immunity of Symmetric Boolean Functions
In this paper, we analyse the algebraic immunity of symmetric Boolean functions. We identify a set of lowest degree annihilators for symmetric functions and propose an efficient al...
An Braeken, Bart Preneel
156
Voted
MDM
2005
Springer
165views Communications» more  MDM 2005»
15 years 9 months ago
STEP: Self-Tuning Energy-safe Predictors
Data access prediction has been proposed as a mechanism to overcome latency lag, and more recently as a means of conserving energy in mobile systems. We present a fully adaptive p...
James Larkby-Lahet, Ganesh Santhanakrishnan, Ahmed...
134
Voted
TCC
2005
Springer
116views Cryptology» more  TCC 2005»
15 years 9 months ago
Error Correction in the Bounded Storage Model
We initiate a study of Maurer’s bounded storage model (JoC, 1992) in presence of transmission errors and perhaps other types of errors that cause different parties to have incon...
Yan Zong Ding
143
Voted
ASSETS
2004
ACM
15 years 9 months ago
A web accessibility service: update and findings
We report here on our progress on a project first described at the ASSETS 2002 conference. At that time, we had developed a prototype system in which a proxy server intermediary w...
Vicki L. Hanson, John T. Richards
« Prev « First page 2374 / 2551 Last » Next »