Sciweavers

1776 search results - page 237 / 356
» Informational cascades in IT adoption
Sort
View
AINA
2007
IEEE
15 years 8 months ago
An Improved Approach to Secure Authentication and Signing
We know how to build secure systems but for security measures to be truly effective it is necessary to use keys which are far too large for people to commit to memory. The consequ...
David Argles, Alex Pease, Robert John Walters
CVPR
2007
IEEE
15 years 8 months ago
EDA Approach for Model Based Localization and Recognition of Vehicles
We address the problem of model based recognition. Our aim is to localize and recognize road vehicles from monocular images in calibrated scenes. A deformable 3D geometric vehicle...
Zhaoxiang Zhang, Weishan Dong, Kaiqi Huang, Tieniu...
CVPR
2007
IEEE
15 years 8 months ago
Robust 3D Face Recognition Using Learned Visual Codebook
In this paper, we propose a novel learned visual codebook (LVC) for 3D face recognition. In our method, we first extract intrinsic discriminative information embedded in 3D faces...
Cheng Zhong, Zhenan Sun, Tieniu Tan
CVPR
2007
IEEE
15 years 8 months ago
Accurate Dynamic Sketching of Faces from Video
A sketch captures the most informative part of an object, in a much more concise and potentially robust representation (e.g., for face recognition or new capabilities of manipulat...
Zijian Xu, Jiebo Luo
GLOBECOM
2007
IEEE
15 years 8 months ago
LOFT: A Latency-Oriented Fault Tolerant Transport Protocol for Wireless Sensor-Actuator Networks
— Wireless sensor-actuator networks, or WSANs, refer to a group of sensors and actuators which collect data from the environment and perform application-specific actions in resp...
Edith C. H. Ngai, Yangfan Zhou, Michael R. Lyu, Ji...