Sciweavers

2284 search results - page 138 / 457
» The new iris data: modular data generators
Sort
View
127
Voted
DICTA
2007
15 years 2 months ago
Biometric Based Cryptographic Key Generation from Faces
Existing asymmetric encryption algorithms require the storage of the secret private key. Stored keys are often protected by poorly selected user passwords that can either be guess...
B. Chen, V. Chandran
IPPS
2003
IEEE
15 years 6 months ago
A Novel Design Technology for Next Generation Ubiquitous Computing Architecture
Modern applications for mobile computing require high performance architectures. On the other hand, there are restrictions such as storage or power consumption. The use of reconï¬...
Carsten Nitsch, Camillo Lara, Udo Kebschull
100
Voted
IEAAIE
1994
Springer
15 years 4 months ago
Large-Scale Machine Translation: An Interlingua Approach
In this paper we discuss the design and development of an interlingua for a large-scale MT project. We also discuss how the resulting KANT interlingua constrains complexity, suppo...
Deryle W. Lonsdale, Alexander Franz, John R. R. Le...
189
Voted
POPL
2007
ACM
16 years 29 days ago
Specialization of CML message-passing primitives
Concurrent ML (CML) is a statically-typed higher-order concurrent language that is embedded in Standard ML. Its most notable feature is its support for first-class synchronous ope...
John H. Reppy, Yingqi Xiao
85
Voted
DAC
2001
ACM
16 years 1 months ago
Semi-Formal Test Generation with Genevieve
This paper describes the first application of the Genevieve test generation methodology. The Genevieve approach uses semi-formal techniques derived from "model-checking"...
Julia Dushina, Mike Benjamin, Daniel Geist