Sciweavers

9931 search results - page 1748 / 1987
» Generative Modeling by PRISM
Sort
View
159
Voted
ICISC
2004
146views Cryptology» more  ICISC 2004»
15 years 6 months ago
Identity Based Threshold Ring Signature
In threshold ring signature schemes, any group of t entities spontaneously conscript arbitrarily n - t entities to generate a publicly verifiable t-out-of-n signature on behalf of ...
Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming ...
BIOSIG
2003
140views Biometrics» more  BIOSIG 2003»
15 years 6 months ago
Multifactor Biometric Sketch Authentication
: In this paper we propose a multifactor biometric sketch authentication method based on biometric sketch recognition and a user’s personal knowledge about the sketch‘s content...
Arslan Brömme, Stephan Al-Zubi
133
Voted
DGO
2003
175views Education» more  DGO 2003»
15 years 6 months ago
Coastal Mapping and Change Detection Using High--Resolution IKONOS Satellite Imagery
Shoreline mapping and shoreline change detection are critical in many coastal zone applications. This paper presents results of the semi-automatic mapping of a coastal area of Lak...
Kaichang Di, Ruijin Ma, Jue Wang, Ron Li
127
Voted
HCI
2001
15 years 6 months ago
Analysis of haptic data for sign language recognition
: For the past two years we have been addressing the challenges involved in managing the data generated within immersive environments. We together with many other researchers have ...
Cyrus Shahabi, Leila Kaghazian, Soham Mehta, Amol ...
MASCOTS
2004
15 years 6 months ago
Size-Based Scheduling Policies with Inaccurate Scheduling Information
Size-based scheduling policies such as SRPT have been studied since 1960s and have been applied in various arenas including packet networks and web server scheduling. SRPT has bee...
Dong Lu, Huanyuan Sheng, Peter A. Dinda
« Prev « First page 1748 / 1987 Last » Next »