Sciweavers

19130 search results - page 3418 / 3826
» Modelling multi-path problems
Sort
View
167
Voted
SSWMC
2004
15 years 6 months ago
Security for biometric data
Biometric authentication, i.e. verifying the claimed identity of a person based on physiological characteristics or behavioral traits, has the potential to contribute to both priv...
Claus Vielhauer, Ton Kalker
IKE
2003
15 years 6 months ago
A Tree-Based inverted File for Fast Ranked-Document Retrieval
Inverted files are widely used to index documents in large-scale information retrieval systems. An inverted file consists of posting lists, which can be stored in either a documen...
Wann-Yun Shieh, Tien-Fu Chen, Chung-Ping Chung
140
Voted
INTERACT
2003
15 years 6 months ago
Enticing People to Interact with Large Public Displays in Public Spaces
: Large displays are increasingly being placed in public places to support community and social activities. However, a major problem that has been observed with this new form of pu...
Harry Brignull, Yvonne Rogers
WSCG
2004
152views more  WSCG 2004»
15 years 6 months ago
Stable Cloth Animation with Adaptive Level of Detail
Cloth simulation is a highly intensive processor task. Higher details are often traded or sacrificed for speed in order to maintain the simulation at reasonable rates. This articl...
Fernando Pedro Birra, Manuel Próspero dos S...
124
Voted
WSCG
2004
232views more  WSCG 2004»
15 years 6 months ago
3D Shape Extraction Using Photographic Tomography with Its Applications
Tomographic imaging is a technique for exploration of a cross-section of an inspected object without destruction. Normally, the input data, known as the projections, are gathered ...
S. Reruang, Withawat Withayachumnankul, Chuchart P...
« Prev « First page 3418 / 3826 Last » Next »