Sciweavers

1840 search results - page 334 / 368
» time 2002
Sort
View
MOBIHOC
2002
ACM
14 years 7 months ago
Path set selection in mobile ad hoc networks
Topological changes in mobile ad hoc networks frequently render routing paths unusable. Such recurrent path failures have detrimental effects on the network ability to support QoS...
Emin Gün Sirer, Panagiotis Papadimitratos, Zy...
GLOBECOM
2009
IEEE
14 years 2 months ago
Reusable Set Constructions Using Randomized Dissolvent Templates for Biometric Security
—The emerging biometric cryptography has gained significant interests for key management and privacy protection, but the previously proposed schemes using set metrics for finge...
Jinyang Shi, Kwok-Yan Lam, Ming Gu, Husheng Li
ETRA
2006
ACM
101views Biometrics» more  ETRA 2006»
14 years 1 months ago
Gaze-contingent temporal filtering of video
We describe an algorithm for manipulating the temporal resolution of a video in real time, contingent upon the viewer’s direction of gaze. The purpose of this work is to study t...
Martin Böhme, Michael Dorr, Thomas Martinetz,...
APPT
2005
Springer
14 years 1 months ago
Grid Developing Environment in CGSP System
Abstract. Grid computing is becoming a mainstream technology for multiinstitutional distributed resources sharing and system integration. Normally, the programmer's productivi...
Weimin Zheng, Lisen Mu, Qing Wang, Yongwei Wu
ICAPR
2005
Springer
14 years 1 months ago
Fingerprint Image Enhancement Using STFT Analysis
Contrary to popular belief, despite decades of research in fingerprints, reliable fingerprint recognition is an open problem. Extracting features out of poor quality prints is t...
Sharat Chikkerur, Venu Govindaraju, Alexander N. C...