Sciweavers

20878 search results - page 3955 / 4176
» Database
Sort
View
133
Voted
ICB
2007
Springer
156views Biometrics» more  ICB 2007»
15 years 9 months ago
Robust Extraction of Secret Bits from Minutiae
Abstract. Our goal is to extract consistent bits from the same fingerprint in a noisy environment. Such bits can then be used as a secret key in several cryptographic applications...
Ee-Chien Chang, Sujoy Roy
164
Voted
IWIC
2007
Springer
15 years 9 months ago
Collaborative Platform for Multilingual Resource Development and Intercultural Communication
The Internet has already connected people and established a mature online community. The use of WWW is also in the main stream of disseminating one’s information and services. In...
Virach Sornlertlamvanich, Thatsanee Charoenporn, K...
PAM
2007
Springer
15 years 9 months ago
Two Days in the Life of the DNS Anycast Root Servers
The DNS root nameservers routinely use anycast in order to improve their service to clients and increase their resilience against various types of failures. We study DNS traffic co...
Ziqian Liu, Bradley Huffaker, Marina Fomenkov, Nev...
136
Voted
PSIVT
2007
Springer
239views Multimedia» more  PSIVT 2007»
15 years 9 months ago
People Counting in Low Density Video Sequences
This paper presents a novel approach for automatic people counting in videos captured through a conventional closed-circuit television (CCTV) using computer vision techniques. The ...
Jaime Dalla Valle, Luiz E. Soares de Oliveira, Ale...
RWEB
2007
Springer
15 years 9 months ago
Semantic Descriptions in an Enterprise Search Solution
Today customers want to use powerful search engines for their huge and increasing content repositories. Full-text-only products with simple result lists are not enough to satisfy t...
Uwe Crenze, Stefan Köhler, Kristian Hermsdorf...
« Prev « First page 3955 / 4176 Last » Next »