Sciweavers

3361 search results - page 3 / 673
» An Approach of Performance Evaluation in Authentic Database ...
Sort
View
ICB
2007
Springer
136views Biometrics» more  ICB 2007»
13 years 11 months ago
Distance Measures for Gabor Jets-Based Face Authentication: A Comparative Evaluation
Local Gabor features (jets) have been widely used in face recognition systems. Once the sets of jets have been extracted from the two faces to be compared, a proper measure of simi...
Daniel González-Jiménez, Manuele Bic...
IWBRS
2005
Springer
134views Biometrics» more  IWBRS 2005»
13 years 10 months ago
Using Score Normalization to Solve the Score Variation Problem in Face Authentication
Abstract. This paper investigates the score normalization technique for enhancing the performance of face authentication. We firstly discuss the thresholding approach for face auth...
Fei Yang, Shiguang Shan, Bingpeng Ma, Xilin Chen, ...
ISW
2009
Springer
13 years 11 months ago
MAC Precomputation with Applications to Secure Memory
We present ShMAC (Shallow MAC), a fixed input length message authentication code that performs most of the computation prior to the availability of the message. Specifically, Sh...
Juan A. Garay, Vladimir Kolesnikov, Rae McLellan
COOPIS
2000
IEEE
13 years 9 months ago
An Evaluation of the Java-Based Approaches to Web Database Access
Given the undeniable popularity of the Web, providing efficient and secure access to remote databases using a Web browser is crucial for the emerging cooperative information system...
Stavros Papastavrou, Panos K. Chrysanthis, George ...
IEEECIT
2010
IEEE
13 years 3 months ago
Centralized Project-Based Teaching Approach in Database Application Development Training
—The centralized teaching approach is different from the general lecture course, as it requires students focus all efforts within a period of time to finish a project task in ord...
Gaoyan Zhang, Haifeng Ke, Minghui Wu, Jun Liu