Sciweavers

9503 search results - page 102 / 1901
» Authenticated System Calls
Sort
View
AINA
2007
IEEE
15 years 9 months ago
Verifying Identifier-Authenticity in Ubiquitous Computing Environment
In ubiquitous computing environment, identification of objects and places in the real world is important, and 2-D printing code is useful to store identifiers of them. However, si...
Tetsuo Kamina, Toshinori Aoki, Yoshiteru Eto, Nobo...
CVIU
2008
118views more  CVIU 2008»
15 years 5 months ago
Multimodal person authentication using speech, face and visual speech
This paper presents a method for automatic multimodal person authentication using speech, face and visual speech modalities. The proposed method uses the motion information to loc...
S. Palanivel, B. Yegnanarayana
ICIP
2002
IEEE
16 years 6 months ago
Likelihood normalization for face authentication in variable recording conditions
In this paper we evaluate the effectiveness of two likelihood normalization techniques, the Background Model Set (BMS) and the Universal Background Model (UBM), for improving perf...
Kuldip K. Paliwal, Conrad Sanderson
160
Voted
CHI
2007
ACM
15 years 9 months ago
Education, entertainment and authenticity: lessons learned from designing an interactive exhibit about medieval music
In this paper we describe the design experience gathered from creating an interactive exhibit about medieval music. This system was designed as an educational exhibit that relies ...
Marius Wolf, Eric Lee, Jan Borchers
AMDO
2006
Springer
15 years 8 months ago
Automatic Pose Correction for Local Feature-Based Face Authentication
In this paper, we present an automatic face authentication system. Accurate segmentation of prominent facial features is accomplished by means of an extension of the Active Shape M...
Daniel González-Jiménez, Federico Su...