Sciweavers

1050 search results - page 26 / 210
» Two methods of authenticated positioning
Sort
View
CEAS
2005
Springer
15 years 5 months ago
Accredited DomainKeys: A Service Architecture for Improved Email Validation
We present an architecture called Accredited DomainKeys, which builds on the DomainKeys email authentication infrastructure to address the following questions: • “Did the send...
Michael T. Goodrich, Roberto Tamassia, Danfeng Yao
ECCV
2006
Springer
16 years 1 months ago
Shape-from-Silhouette with Two Mirrors and an Uncalibrated Camera
Two planar mirrors are positioned to show five views of an object, and snapshots are captured from different viewpoints. We present closed form solutions for calculating the focal ...
Keith Forbes, Fred Nicolls, Gerhard de Jager, Anth...
MICCAI
2009
Springer
15 years 9 months ago
A Two-Level Approach Towards Semantic Colon Segmentation: Removing Extra-Colonic Findings
Abstract. Computer aided detection (CAD) of colonic polyps in computed tomographic colonography has tremendously impacted colorectal cancer diagnosis using 3D medical imaging. It i...
Le Lu, Matthias Wolf, Jianming Liang, Murat Dundar...
ROBOCUP
2004
Springer
86views Robotics» more  ROBOCUP 2004»
15 years 5 months ago
A Method of Pseudo Stereo Vision from Images of Cameras Shutter Timing Adjusted
Multiple cameras have been used to get a view of a large area. In some cases, the cameras are placed so that their views are overlapped to get a more complete view. 3D information ...
Hironobu Fujiyoshi, Shoichi Shimizu, Yasunori Naga...
SOUPS
2009
ACM
15 years 6 months ago
Look into my eyes!: can you guess my password?
Authentication systems for public terminals – and thus public spaces – have to be fast, easy and secure. Security is of utmost importance since the public setting allows manif...
Alexander De Luca, Martin Denzel, Heinrich Hussman...