Sciweavers

1018 search results - page 81 / 204
» Remote User Authentication Using Public Information
Sort
View
144
Voted
VLDB
2002
ACM
138views Database» more  VLDB 2002»
15 years 4 months ago
Adaptable Similarity Search using Non-Relevant Information
Many modern database applications require content-based similarity search capability in numeric attribute space. Further, users' notion of similarity varies between search se...
T. V. Ashwin, Rahul Gupta, Sugata Ghosal
ICPR
2008
IEEE
15 years 11 months ago
Online personal identification in night using multiple face representations
This paper details a fully automated face authentication system using low-cost near infrared imaging. The image normalization step consists of eye center localization, scale corre...
Ajay Kumar, T. Srikanth
ICPR
2008
IEEE
15 years 11 months ago
Biomapping: Privacy trustworthy biometrics using noninvertible and discriminable constructions
Biometric authentication and privacy protection are conflicting issues in a practical system. Since biometrics cannot be revoked or canceled if compromised duo to the permanent as...
Jinyang Shi, Zhiyang You, Ming Gu, Kwok-Yan Lam
IRES
2000
71views more  IRES 2000»
15 years 4 months ago
Library Research Seminar II Partners and connections
Although libraries are public spaces in which individuals engage in a range of social and informational activities, few researchers in library and information science use ethnogra...
JCDL
2009
ACM
162views Education» more  JCDL 2009»
15 years 11 months ago
No bull, no spin: a comparison of tags with other forms of user metadata
User-contributed tags have shown promise as a means of indexing multimedia collections by harnessing the combined efforts and enthusiasm of online communities. But tags are only o...
Catherine C. Marshall