Sciweavers

384 search results - page 61 / 77
» A Vector Approach to Cryptography Implementation
Sort
View
ICPR
2002
IEEE
15 years 6 months ago
Biometric Hash based on Statistical Features of Online Signatures
This paper presents a new approach to generate biometric hash values based on statistical features in online signature signals. Whilst the output of typical online signature verif...
Claus Vielhauer, Ralf Steinmetz, Astrid Mayerh&oum...
118
Voted
FPGA
2009
ACM
273views FPGA» more  FPGA 2009»
15 years 8 months ago
A parallel/vectorized double-precision exponential core to accelerate computational science applications
Many natural processes exhibit exponential decay and, consequently, computational scientists make extensive use of e−x in computer simulation experiments. While it is common to ...
Robin Pottathuparambil, Ron Sass
CVPR
2001
IEEE
16 years 3 months ago
Diffusion Tensor Regularization with Constraints Preservation
This paper deals with the problem of regularizing noisy fields of diffusion tensors, considered as symmetric and semi-positive definite ? ? ? matrices (as for instance 2D structur...
David Tschumperlé, Rachid Deriche
CVPR
2008
IEEE
16 years 3 months ago
Scene classification with low-dimensional semantic spaces and weak supervision
A novel approach to scene categorization is proposed. Similar to previous works of [11, 15, 3, 12], we introduce an intermediate space, based on a low dimensional semantic "t...
Nikhil Rasiwasia, Nuno Vasconcelos
102
Voted
ICPR
2004
IEEE
16 years 3 months ago
Competitive Coding Scheme for Palmprint Verification
There is increasing interest in the development of reliable, rapid and non-intrusive security control systems. Among the many approaches, biometrics such as palmprints provide hig...
Adams Wai-Kin Kong, David Zhang