Sciweavers

4899 search results - page 721 / 980
» Robust normative systems
Sort
View
97
Voted
ICARIS
2009
Springer
15 years 5 months ago
A Sense of 'Danger' for Windows Processes
The sophistication of modern computer malware demands run-time malware detection strategies which are not only efficient but also robust to obfuscation and evasion attempts. In thi...
Salman Manzoor, M. Zubair Shafiq, S. Momina Tabish...
90
Voted
ICB
2009
Springer
122views Biometrics» more  ICB 2009»
15 years 5 months ago
A New Fake Iris Detection Method
Recent research works have revealed that it is not difficult to spoof an automated iris recognition system using fake iris such as contact lens and paper print etc. Therefore, it i...
XiaoFu He, Yue Lu, Pengfei Shi
78
Voted
ICB
2009
Springer
185views Biometrics» more  ICB 2009»
15 years 5 months ago
Pose Invariant Palmprint Recognition
Abstract. A palmprint based authentication system that can work with a multipurpose camera in uncontrolled circumstances, such as those mounted on a laptop, mobile device or those ...
Chhaya Methani, Anoop M. Namboodiri
ISVC
2009
Springer
15 years 5 months ago
Combinatorial Preconditioners and Multilevel Solvers for Problems in Computer Vision and Image Processing
Abstract. Linear systems and eigen-calculations on symmetric diagonally dominant matrices (SDDs) occur ubiquitously in computer vision, computer graphics, and machine learning. In ...
Ioannis Koutis, Gary L. Miller, David Tolliver
78
Voted
NOSSDAV
2009
Springer
15 years 5 months ago
End-to-end secure delivery of scalable video streams
We investigate the problem of securing the delivery of scalable video streams so that receivers can ensure the authenticity (originality and integrity) of the video. Our focus is ...
Kianoosh Mokhtarian, Mohamed Hefeeda