Sciweavers

6574 search results - page 77 / 1315
» Current Signatures: Application
Sort
View
109
Voted
IMA
2009
Springer
124views Cryptology» more  IMA 2009»
15 years 7 months ago
Comparing with RSA
A multi-set (ms) is a set where an element can occur more than once. ms hash functions (mshfs) map mss of arbitrary cardinality to fixed-length strings. This paper introduces a ne...
Julien Cathalo, David Naccache, Jean-Jacques Quisq...
73
Voted
ICPR
2008
IEEE
15 years 7 months ago
Computational approaches for real-time extraction of soft biometrics
Soft biometrics, as a prescreening filter, contribute to a much smaller candidate pool and allow the overall query to perform better and faster. In this paper, we focus on the eff...
Yang Ran, Gavin Rosenbush, Qinfen Zheng
129
Voted
ICMCS
2005
IEEE
172views Multimedia» more  ICMCS 2005»
15 years 6 months ago
A Study of Synthesizing New Human Motions from Sampled Motions Using Tensor Decomposition
This paper applies an algorithm, based on Tensor Decomposition, to a new synthesis application: by using sampled motions of people of different ages under different emotional stat...
Rovshan Kalanov, Jieun Cho, Jun Ohya
CIVR
2005
Springer
134views Image Analysis» more  CIVR 2005»
15 years 6 months ago
Modeling Multi-object Spatial Relationships for Satellite Image Database Indexing and Retrieval
Abstract. Geospatial information analysts are interested in spatial configurations of objects in satellite imagery and, more importantly, the ability to search a large-scale datab...
Grant J. Scott, Matt Klaric, Chi-Ren Shyu
ICICS
2005
Springer
15 years 6 months ago
Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream
Abstract. Multimedia community is moving from monolithic applications to more flexible and scalable integrated solutions. Stream authentication is more complex since a stream may ...
Tieyan Li, Huafei Zhu, Yongdong Wu