Sciweavers

1242 search results - page 176 / 249
» Digital Objects as Passwords
Sort
View
CHI
2004
ACM
15 years 10 months ago
DiamondSpin: an extensible toolkit for around-the-table interaction
DiamondSpin is a toolkit for the efficient prototyping of and experimentation with multi-person, concurrent interfaces for interactive shared displays. In this paper, we identify ...
Chia Shen, Clifton Forlines, Frédéri...
PERCOM
2007
ACM
15 years 9 months ago
Physically Unclonable Function-Based Security and Privacy in RFID Systems
Radio Frequency Identification (RFID) is an increasingly popular technology that uses radio signals for object identification. Tracking and authentication in RFID tags have raised...
Leonid Bolotnyy, Gabriel Robins

Publication
583views
15 years 7 months ago
A Camera flash based projector system for true scale metric reconstruction
Computer vision techniques have been applied for rapid and accurate structure recovery in many fields. Most methods perform poorly in areas containing little or no texture and i...
Rohith MV, Gowri Somanath, Debra Norris, Jennifer ...
ICCAD
2001
IEEE
217views Hardware» more  ICCAD 2001»
15 years 6 months ago
ASF: A Practical Simulation-Based Methodology for the Synthesis of Custom Analog Circuits
: This paper describes ASF, a novel cell-level analog synthesis framework that can size and bias a given circuit topology subject to a set of performance objectives and a manufactu...
Michael Krasnicki, Rodney Phelps, James R. Hellums...
CVPR
2010
IEEE
15 years 6 months ago
Boundary Learning by Optimization with Topological Constraints
Recent studies have shown that machine learning can improve the accuracy of detecting object boundaries in images. In the standard approach, a boundary detector is trained by mini...
Viren Jain, Benjamin Bollmann, Bobby Kasthuri, Ken...