Sciweavers

345 search results - page 3 / 69
» When Systems Loose their Identity
Sort
View
IJNSEC
2007
189views more  IJNSEC 2007»
13 years 5 months ago
When Fingerprints Are Combined with Iris - A Case Study: FVC2004 and CASIA
This paper presents novel studies on fusion strategies for personal identification using fingerprint and iris biometrics. The purpose of our paper is to investigate whether the ...
Alessandra Lumini, Loris Nanni
IVC
2002
91views more  IVC 2002»
13 years 5 months ago
Compensating for ensemble-specific effects when building facial models
When attempting to code faces for modeling or recognition, estimates of dimensions are typically obtained from an ensemble. These tend to be significantly sub-optimal. Firstly, en...
Nicholas Costen, Timothy F. Cootes, Christopher J....
RTAS
2007
IEEE
14 years 1 days ago
Real-Time Task Replication for Fault Tolerance in Identical Multiprocessor Systems
Multiprocessor platforms have been widely adopted in both embedded and server systems. In addition to the performance improvement, multiprocessor systems could have the flexibili...
Jian-Jia Chen, Chuan-Yue Yang, Tei-Wei Kuo, Shau-Y...
AAECC
1998
Springer
167views Algorithms» more  AAECC 1998»
13 years 5 months ago
Generalized Bezout Identity
We describe a new approach of the generalized Bezout identity for linear time-varying ordinary differential control systems. We also explain when and how it can be extended to line...
J. F. Pommaret, Alban Quadrat
COMPSAC
2010
IEEE
13 years 3 months ago
A Consistency Model for Identity Information in Distributed Systems
In distributed IT systems, replication of information is commonly used to strengthen the fault tolerance on a technical level or the autonomy of an organization on a business level...
Thorsten Höllrigl, Jochen Dinger, Hannes Hart...