Sciweavers

66 search results - page 9 / 14
» Special Issue on Digital Ecologies
Sort
View
WPES
2003
ACM
15 years 3 months ago
Anonymous credentials with biometrically-enforced non-transferability
We present a model and protocol for anonymous credentials. Rather than using deterrents to ensure non-transferability, our model uses secure hardware with biometric authentication...
Russell Impagliazzo, Sara Miner More
ICCV
2003
IEEE
15 years 11 months ago
Fast Intensity-based 2D-3D Image Registration of Clinical Data Using Light Fields
Registration of a preoperative CT (3D) image to one or more X-ray projection (2D) images, a special case of the pose estimation problem, has been attempted in a variety of ways wi...
Daniel B. Russakoff, Torsten Rohlfing, Calvin R. M...
FPGA
2007
ACM
150views FPGA» more  FPGA 2007»
15 years 4 months ago
FPGA-friendly code compression for horizontal microcoded custom IPs
Shrinking time-to-market and high demand for productivity has driven traditional hardware designers to use design methodologies that start from high-level languages. However, meet...
Bita Gorjiara, Daniel Gajski
COMPUTER
2002
91views more  COMPUTER 2002»
14 years 9 months ago
Representative Democracy and the Profession
the term refers in an abstract way to a process or institution under which government openly solicits, preserves, and fosters information about its citizens' interests. At the...
W. Neville Holmes
ICML
2008
IEEE
15 years 10 months ago
Modified MMI/MPE: a direct evaluation of the margin in speech recognition
In this paper we show how common speech recognition training criteria such as the Minimum Phone Error criterion or the Maximum Mutual Information criterion can be extended to inco...
Georg Heigold, Hermann Ney, Ralf Schlüter, Th...