Sciweavers

195 search results - page 27 / 39
» Perfect Byte-Correcting Codes
Sort
View
ICIP
2004
IEEE
16 years 1 months ago
Distributed compression of the plenoptic function
In this paper, we consider the problem of distributed compression in camera sensor networks. Due to the spatial proximity of the different cameras, acquired images can be highly d...
Nicolas Gehrig, Pier Luigi Dragotti
ICPR
2008
IEEE
16 years 1 months ago
Securing fingerprint template: Fuzzy vault with minutiae descriptors
Fuzzy vault has been shown to be an effective technique for securing fingerprint minutiae templates. Its security depends on the difficulty in identifying the set of genuine minut...
Abhishek Nagar, Anil K. Jain, Karthik Nandakumar
WWW
2007
ACM
16 years 15 days ago
Defeating script injection attacks with browser-enforced embedded policies
Web sites that accept and display content such as wiki articles or comments typically filter the content to prevent injected script code from running in browsers that view the sit...
Trevor Jim, Nikhil Swamy, Michael Hicks
DCC
2006
IEEE
15 years 11 months ago
Distributed Sampling and Compression of Scenes with Finite Rate of Innovation in Camera Sensor Networks
We study the problem of distributed sampling and compression in sensor networks when the sensors are digital cameras that acquire a 3-D visual scene of interest from different vie...
Nicolas Gehrig, Pier Luigi Dragotti
ISPASS
2010
IEEE
15 years 6 months ago
Memphis: Finding and fixing NUMA-related performance problems on multi-core platforms
—Until recently, most high-end scientific applications have been immune to performance problems caused by NonUniform Memory Access (NUMA). However, current trends in micro-proces...
Collin McCurdy, Jeffrey S. Vetter