Sciweavers

429 search results - page 75 / 86
» Improved Algorithms for the k Maximum-Sums Problems
Sort
View
CORR
2010
Springer
152views Education» more  CORR 2010»
14 years 10 months ago
Deploying Wireless Networks with Beeps
Abstract. We present the discrete beeping communication model, which assumes nodes have minimal knowledge about their environment and severely limited communication capabilities. S...
Alejandro Cornejo, Fabian Kuhn
DAC
2005
ACM
15 years 10 months ago
Efficient fingerprint-based user authentication for embedded systems
User authentication, which refers to the process of verifying the identity of a user, is becoming an important security requirement in various embedded systems. While conventional...
Pallav Gupta, Srivaths Ravi, Anand Raghunathan, Ni...
TIFS
2010
173views more  TIFS 2010»
14 years 8 months ago
A hybrid approach for generating secure and discriminating face template
Abstract—Biometric template protection is one of the most important issues in deploying a practical biometric system. To tackle this problem, many algorithms, that do not store t...
Yi C. Feng, Pong C. Yuen, Anil K. Jain
ATAL
2009
Springer
15 years 4 months ago
Searching for fair joint gains in agent-based negotiation
In multi-issue negotiations, autonomous agents can act cooperatively to benefit from mutually preferred agreements. However, empirical evidence suggests that they often fail to s...
Minyi Li, Quoc Bao Vo, Ryszard Kowalczyk
ICB
2007
Springer
280views Biometrics» more  ICB 2007»
15 years 4 months ago
3D Model-Based Face Recognition in Video
Face recognition in video has gained wide attention due to its role in designing surveillance systems. One of the main advantages of video over still frames is that evidence accumu...
Unsang Park, Anil K. Jain