Sciweavers

2399 search results - page 63 / 480
» On Authentication between Human and Computer
Sort
View
IEEEARES
2010
IEEE
15 years 4 months ago
Patterns for Secure Boot and Secure Storage in Computer Systems
—Trusted Computing aims at enhancing the security of IT systems by using a combination of trusted hardware and software components to provide security guarantees. This includes s...
Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
3DPVT
2006
IEEE
227views Visualization» more  3DPVT 2006»
15 years 3 months ago
Automatic Locating of Anthropometric Landmarks on 3D Human Models
We present an algorithm for automatic locating of anthropometric landmarks on 3D human scans. Our method is based on learning landmark characteristics and the spatial relationship...
Zouhour Ben Azouz, Chang Shu, Anja Mantel
SC
2005
ACM
15 years 3 months ago
Massive High-Performance Global File Systems for Grid computing
In this paper we describe the evolution of Global File Systems from the concept of a few years ago, to a first demonstration using hardware Fibre Channel frame encoding into IP pa...
Phil Andrews, Patricia A. Kovatch, Chris Jordan
EUROGRAPHICS
2010
Eurographics
15 years 6 months ago
Human Motion Synthesis with Optimization-based Graphs
Continuous constrained optimization is a powerful tool for synthesizing novel human motion segments that are short. Graph-based motion synthesis methods such as motion graphs and ...
Cheng Ren, Liming Zhao, Alla Safonova
ICPR
2002
IEEE
15 years 11 months ago
Interacting Multiple Model (IMM) Kalman Filters for Robust High Speed Human Motion Tracking
Accurate and robust tracking of humans is of growing interest in the image processing and computer vision communities. The ability of a vision system to track the subjects and acc...
Michael E. Farmer, Rein-Lien Hsu, Anil K. Jain