Sciweavers

380 search results - page 51 / 76
» Trajectory Based Behavior Analysis for User Verification
Sort
View
APVIS
2008
15 years 1 months ago
A Novel Visualization System for Expressive Facial Motion Data Exploration
Facial emotions and expressive facial motions have become an intrinsic part of many graphics systems and human computer interaction applications. The dynamics and high dimensional...
Tanasai Sucontphunt, Xiaoru Yuan, Qing Li, Zhigang...
ANSS
2002
IEEE
15 years 4 months ago
Performance Analysis for Data Service in Third Generation Mobile Telecommunication Networks
The data traffic in wireless networks for the third generation (3G) mobile telecommunication systems should take into account a variety of services (voice, data, video) and envir...
Aloizio Pereira da Silva, Geraldo Robson Mateus
AIRS
2008
Springer
15 years 6 months ago
News Page Discovery Policy for Instant Crawlers
Many news pages which are of high freshness requirement are published on the internet every day. They should be downloaded immediately by instant crawlers. Otherwise, they will bec...
Yong Wang, Yiqun Liu, Min Zhang, Shaoping Ma
CLUSTER
2002
IEEE
15 years 4 months ago
I/O Analysis and Optimization for an AMR Cosmology Application
In this paper, we investigate the data access patterns and file I/O behaviors of a production cosmology application that uses the adaptive mesh refinement (AMR) technique for it...
Jianwei Li, Wei-keng Liao, Alok N. Choudhary, Vale...
CANS
2009
Springer
136views Cryptology» more  CANS 2009»
15 years 6 months ago
Verifying Anonymous Credential Systems in Applied Pi Calculus
Abstract. Anonymous credentials are widely used to certify properties of a credential owner or to support the owner to demand valuable services, while hiding the user’s identity ...
Xiangxi Li, Yu Zhang, Yuxin Deng