Sciweavers

796 search results - page 155 / 160
» Spoofing prevention method
Sort
View
98
Voted
TOG
2008
174views more  TOG 2008»
15 years 22 days ago
A mass spring model for hair simulation
Our goal is to simulate the full hair geometry, consisting of approximately one hundred thousand hairs on a typical human head. This will require scalable methods that can simulat...
Andrew Selle, Michael Lentine, Ronald Fedkiw
115
Voted
TCSV
2002
101views more  TCSV 2002»
15 years 14 days ago
Error-resilient video transcoding for robust internetwork communications using GPRS
Abstract--A novel fully comprehensive mobile video communications system is proposed in this paper. This system exploits the useful rate management features of the video transcoder...
Safak Dogan, Akin Cellatoglu, Mustafa Uyguroglu, A...
119
Voted
TJS
2002
121views more  TJS 2002»
15 years 14 days ago
Precise Data Locality Optimization of Nested Loops
A significant source for enhancing application performance and for reducing power consumption in embedded processor applications is to improve the usage of the memory hierarchy. In...
Vincent Loechner, Benoît Meister, Philippe C...
118
Voted
PAMI
2007
133views more  PAMI 2007»
15 years 10 days ago
Generating Cancelable Fingerprint Templates
—Biometrics-based authentication systems offer obvious usability advantages over traditional password and token-based authentication schemes. However, biometrics raises several p...
Nalini K. Ratha, Sharat Chikkerur, Jonathan H. Con...
126
Voted
TASE
2008
IEEE
15 years 8 days ago
An Intelligent Online Monitoring and Diagnostic System for Manufacturing Automation
Condition monitoring and fault diagnosis in modern manufacturing automation is of great practical significance. It improves quality and productivity, and prevents damage to machine...
Ming Ge, Yangsheng Xu, Ruxu Du