Sciweavers

3812 search results - page 674 / 763
» Combinations of TRAP Based Systems
Sort
View
DIM
2008
ACM
14 years 11 months ago
Minimal information disclosure with efficiently verifiable credentials
Public-key based certificates provide a standard way to prove one's identity, as attested by some certificate authority (CA). However, plain certificates provide a binary ide...
David Bauer, Douglas M. Blough, David Cash
FGR
2008
IEEE
264views Biometrics» more  FGR 2008»
14 years 11 months ago
Large scale learning and recognition of faces in web videos
The phenomenal growth of video on the web and the increasing sparseness of meta information associated with it forces us to look for signals from the video content for search/info...
Ming Zhao 0003, Jay Yagnik, Hartwig Adam, David Ba...
TRECVID
2008
14 years 11 months ago
Oxford/IIIT TRECVID 2008 - Notebook paper
The Oxford/IIIT team participated in the high-level feature extraction and interactive search tasks. A vision only approach was used for both tasks, with no use of the text or aud...
James Philbin, Manuel J. Marín-Jimén...
SI3D
2010
ACM
14 years 10 months ago
Efficient irradiance normal mapping
Irradiance normal mapping is a method to combine two popular techniques, light mapping and normal mapping, and is used in games such as Half-Life 2 or Halo 3. This combination all...
Ralf Habel, Michael Wimmer
BMCBI
2007
120views more  BMCBI 2007»
14 years 10 months ago
Recognition of interferon-inducible sites, promoters, and enhancers
Background: Computational analysis of gene regulatory regions is important for prediction of functions of many uncharacterized genes. With this in mind, search of the target genes...
Elena A. Ananko, Yury V. Kondrakhin, Tatyana I. Me...