Sciweavers

1690 search results - page 234 / 338
» Algorithmic Properties of Millstream Systems
Sort
View
137
Voted
ETRA
2010
ACM
178views Biometrics» more  ETRA 2010»
15 years 9 months ago
Biometric identification via an oculomotor plant mathematical model
There has been increased interest in reliable, non-intrusive methods of biometric identification due to the growing emphasis on security and increasing prevalence of identity thef...
Oleg V. Komogortsev, Sampath Jayarathna, Cecilia R...
112
Voted
CSREASAM
2006
15 years 5 months ago
Security Analysis of the Digital Transmission Copy Protection Specification
- This paper analyzes the secure protocols in the digital transmission copy protection (DTCP) specification. The full authentication protocol in the specification is a combination ...
Haibo Tian, Yumin Wang
VMV
2001
209views Visualization» more  VMV 2001»
15 years 5 months ago
A Novel Probabilistic Model for 3D Object Recognition: Spin-Glass Markov Random Fields
This contribution presents a new class of MRF, that is inspired by methods of statistical physics. The new energy function assumes full-connectivity in the neighborhood system and...
Barbara Caputo, Sahla Bouattour, Dietrich Paulus
146
Voted
IJCV
2006
112views more  IJCV 2006»
15 years 3 months ago
Non-Single Viewpoint Catadioptric Cameras: Geometry and Analysis
Conventional vision systems and algorithms assume the imaging system to have a single viewpoint. However, these imaging systems need not always maintain a single viewpoint. For ins...
Rahul Swaminathan, Michael D. Grossberg, Shree K. ...
140
Voted
PODC
2010
ACM
15 years 3 months ago
The k-bakery: local-spin k-exclusion using non-atomic reads and writes
Mutual exclusion is used to coordinate access to shared resources by concurrent processes. k-Exclusion is a variant of mutual exclusion in which up to k processes can simultaneous...
Robert Danek