Sciweavers

108 search results - page 16 / 22
» Transforming a pattern identifier into biometric key generat...
Sort
View
FGR
2008
IEEE
232views Biometrics» more  FGR 2008»
15 years 3 months ago
3D face recognition from multiple images: A shape-from-motion approach
In this article we explore the use of methodologies for 3D reconstruction from multiple images to recognize faces. We try to devise a strategy to tackle the problem of recognizing...
Manuel Marques, João Costeira
KDD
2002
ACM
286views Data Mining» more  KDD 2002»
15 years 9 months ago
Object Boundary Detection For Ontology-Based Image Classification
Technology in the field of digital media generates huge amounts of non-textual information, audio, video, and images, along with more familiar textual information. The potential f...
Lei Wang, Latifur Khan, Casey Breen
ESORICS
2008
Springer
14 years 11 months ago
Cryptographic Protocol Explication and End-Point Projection
Abstract. Cryptographic protocols are useful for engineering trust in transactions. There are several languages for describing these protocols, but these tend to capture the commun...
Jay A. McCarthy, Shriram Krishnamurthi
HICSS
2003
IEEE
112views Biometrics» more  HICSS 2003»
15 years 2 months ago
Learning Through Telemedicine Networks
Telemedicine is advocated for its potential to improve the accessibility and quality of health care delivery while lowering costs [1]. Although the potential benefits of telemedic...
Liqiong Deng, Marshall Scott Poole
TROB
2008
126views more  TROB 2008»
14 years 9 months ago
Online Optimization of Swimming and Crawling in an Amphibious Snake Robot
An important problem in the control of locomotion of robots with multiple degrees of freedom (e.g., biomimetic robots) is to adapt the locomotor patterns to the properties of the e...
Alessandro Crespi, Auke Jan Ijspeert