Sciweavers

1610 search results - page 152 / 322
» Identity Based Multisignatures
Sort
View
SSWMC
2004
15 years 4 months ago
Towards fraud-proof ID documents using multiple data hiding technologies and biometrics
Identity documents, such as ID cards, passports, and driver's licenses, contain textual information, a portrait of the legitimate holder, and eventually some other biometric ...
Justin Picard, Claus Vielhauer, Niels J. Thorwirth
ICASSP
2010
IEEE
15 years 3 months ago
Low-latency online speaker tracking on the AMI Corpus of meeting conversations
Ambient Inteligence aims to create smart spaces providing services in a transparent and non-intrusive fashion, so context awareness and user adaptation are key issues. Speech can ...
Maider Zamalloa, Luis Javier Rodríguez-Fuen...
DAM
2008
99views more  DAM 2008»
15 years 3 months ago
Boundary value problems on weighted networks
We present here a systematic study of general boundary value problems on weighted networks that includes the variational formulation of such problems. In particular, we obtain the...
Enrique Bendito, Angeles Carmona, Andrés M....
JMLR
2006
103views more  JMLR 2006»
15 years 3 months ago
Pattern Recognition for Conditionally Independent Data
In this work we consider the task of relaxing the i.i.d. assumption in pattern recognition (or classification), aiming to make existing learning algorithms applicable to a wider r...
Daniil Ryabko
CORR
2011
Springer
182views Education» more  CORR 2011»
14 years 10 months ago
Cyber-Physical Attacks in Power Networks: Models, Fundamental Limitations and Monitor Design
— Future power networks will be characterized by safe and reliable functionality against physical malfunctions and cyber attacks. This paper proposes a unified framework and adv...
Fabio Pasqualetti, Florian Dörfler, Francesco...