Sciweavers

2399 search results - page 188 / 480
» On Authentication between Human and Computer
Sort
View
CIE
2004
Springer
15 years 4 months ago
University of Southern California's Institute for Creative Technologies
When dealing with large, distributed systems that use state-of-the-art components, individual components are usually developed in parallel. As development continues, the decouplin...
Michael van Lent
ICIP
2009
IEEE
16 years 5 months ago
Asymmetric 3d/2d Face Recognition Based On Lbp Facial Representation And Canonical Correlation Analysis
In the recent years, 3D Face recognition has emerged as a major solution to deal with the unsolved issues for reliable 2D face recognition, i.e. lighting condition and viewpoint v...
CCGRID
2006
IEEE
15 years 10 months ago
A Shibboleth-Protected Privilege Management Infrastructure for e-Science Education
Simplifying access to and usage of large scale compute resources via the Grid is of critical importance to encourage the uptake of e-Research. Security is one aspect that needs to...
J. P. Watt, Oluwafemi Ajayi, Jipu Jiang, Jos Koets...
JPDC
2006
141views more  JPDC 2006»
15 years 4 months ago
M-TREE: A high efficiency security architecture for protecting integrity and privacy of software
Secure processor architectures enable new sets of applications such as commercial grid computing, software copy protection and secure mobile agents by providing secure computing e...
Chenghuai Lu, Tao Zhang, Weidong Shi, Hsien-Hsin S...
CHI
2005
ACM
16 years 4 months ago
Symbolic objects in a networked gestural sound interface
SignalPlay is a sensor-based interactive sound environment in which familiar objects encourage exploration and discovery of sound interfaces through the process of play. Embedded ...
Eric Kabisch, Amanda Williams, Paul Dourish