Sciweavers

2250 search results - page 427 / 450
» Authorizing applications in singularity
Sort
View
CHI
2010
ACM
14 years 10 months ago
Designing with mobile digital storytelling in rural Africa
We reflect on activities to design a mobile application to enable rural people in South Africa's Eastern Cape to record and share their stories, which have implications for `...
Nicola J. Bidwell, Thomas Reitmaier, Gary Marsden,...
ICASSP
2010
IEEE
14 years 10 months ago
Disparity search range estimation: Enforcing temporal consistency
This paper presents a new approach for estimating the disparity search range in stereo video that enforces temporal consistency. Reliable search range estimation is very important...
Dongbo Min, Sehoon Yea, Zafer Arican, Anthony Vetr...
ICASSP
2010
IEEE
14 years 10 months ago
Ultrasonic sensing for robust speech recognition
In this paper, we present our work using ultrasonic sensing of speech for digit recognition. First, a set of spectral ultrasonic features are developed and tuned in order to achie...
Sundararajan Srinivasan, Bhiksha Raj, Tony Ezzat
ICASSP
2010
IEEE
14 years 10 months ago
Privacy and security of features extracted from minutiae aggregates
This paper describes our recent analysis on the security and privacy of biometric feature vectors obtained from fingerprint minutiae. A large number of contiguous regions (cuboid...
Abhishek Nagar, Shantanu Rane, Anthony Vetro
ICASSP
2010
IEEE
14 years 10 months ago
Reconstruction of sparse signals from distorted randomized measurements
In this paper we show that, surprisingly, it is possible to recover sparse signals from nonlinearly distorted measurements, even if the nonlinearity is unknown. Assuming just that...
Petros Boufounos