Sciweavers

1050 search results - page 22 / 210
» Two methods of authenticated positioning
Sort
View
IJMI
2008
97views more  IJMI 2008»
14 years 11 months ago
Positive effects of electronic patient records on three clinical activities
Purpose: To investigate the effects of a fully functional electronic patient record (EPR) system on clinicians' work during team conferences, ward rounds, and nursing handove...
Morten Hertzum, Jesper Simonsen
ICIAP
1999
ACM
15 years 4 months ago
Facial Expression Morphing and Animation with Local Warping Methods
In this paper, we applied local warping techniques to construct a frame work of image-based morphing for facial expressions animation with low complexity. From the experience we o...
Daw-Tung Lin, Han Huang
ICPR
2008
IEEE
16 years 28 days ago
Comparative analysis of registration based and registration free methods for cancelable fingerprint biometrics
Cancelable biometric systems are gaining in popularity for use in person authentication for applications where the privacy and security of biometric templates are important consid...
Achint Oommen Thomas, Nalini K. Ratha, Jonathan H....
TSMC
2010
14 years 6 months ago
Can You See Me Now? Sensor Positioning for Automated and Persistent Surveillance
Most existing camera placement algorithms focus on coverage and/or visibility analysis, which ensures that the object of interest is visible in the camera's field of view (FOV...
Yi Yao, Chung-Hao Chen, Besma R. Abidi, David L. P...
ISCC
2008
IEEE
129views Communications» more  ISCC 2008»
15 years 6 months ago
AT-Angle: A distributed method for localization using angles in sensor networks
Determining where a given sensor is physically located is a challenging issue. In this paper, we address the localization problem where, initially, a certain number of sensors cal...
Clément Saad, Abderrahim Benslimane, Jean-C...