Sciweavers

384 search results - page 61 / 77
» A Vector Approach to Cryptography Implementation
Sort
View
ICPR
2002
IEEE
15 years 4 months ago
Biometric Hash based on Statistical Features of Online Signatures
This paper presents a new approach to generate biometric hash values based on statistical features in online signature signals. Whilst the output of typical online signature verif...
Claus Vielhauer, Ralf Steinmetz, Astrid Mayerh&oum...
102
Voted
FPGA
2009
ACM
273views FPGA» more  FPGA 2009»
15 years 6 months ago
A parallel/vectorized double-precision exponential core to accelerate computational science applications
Many natural processes exhibit exponential decay and, consequently, computational scientists make extensive use of e−x in computer simulation experiments. While it is common to ...
Robin Pottathuparambil, Ron Sass
CVPR
2001
IEEE
16 years 1 months ago
Diffusion Tensor Regularization with Constraints Preservation
This paper deals with the problem of regularizing noisy fields of diffusion tensors, considered as symmetric and semi-positive definite ? ? ? matrices (as for instance 2D structur...
David Tschumperlé, Rachid Deriche
CVPR
2008
IEEE
16 years 1 months ago
Scene classification with low-dimensional semantic spaces and weak supervision
A novel approach to scene categorization is proposed. Similar to previous works of [11, 15, 3, 12], we introduce an intermediate space, based on a low dimensional semantic "t...
Nikhil Rasiwasia, Nuno Vasconcelos
ICPR
2004
IEEE
16 years 25 days ago
Competitive Coding Scheme for Palmprint Verification
There is increasing interest in the development of reliable, rapid and non-intrusive security control systems. Among the many approaches, biometrics such as palmprints provide hig...
Adams Wai-Kin Kong, David Zhang