Sciweavers

1050 search results - page 27 / 210
» Two methods of authenticated positioning
Sort
View
ICBA
2004
Springer
205views Biometrics» more  ICBA 2004»
15 years 5 months ago
Combining Fingerprint and Voiceprint Biometrics for Identity Verification: an Experimental Comparison
Combining multiple biometrics may enhance the performance of personal authentication system in accuracy and reliability. In this paper, we compare 13 combination methods in the con...
Yuan Wang, Yunhong Wang, Tieniu Tan
ACL
2006
15 years 1 months ago
FAST - An Automatic Generation System for Grammar Tests
This paper introduces a method for the semi-automatic generation of grammar test items by applying Natural Language Processing (NLP) techniques. Based on manually-designed pattern...
Chia-Yin Chen, Hsien-Chin Liou, Jason S. Chang
MMSEC
2005
ACM
137views Multimedia» more  MMSEC 2005»
15 years 5 months ago
A fragile watermarking scheme for 3D meshes
In this paper, we propose a new fragile watermarking scheme for 3D meshes. Firstly, the watermark information is adaptively embedded into the mesh geometry by slightly adjusting t...
Hao-Tian Wu, Yiu-ming Cheung
KDD
1994
ACM
140views Data Mining» more  KDD 1994»
15 years 3 months ago
A Comparison of Pruning Methods for Relational Concept Learning
Pre-Pruning and Post-Pruning are two standard methods of dealing with noise in concept learning. Pre-Pruning methods are very efficient, while Post-Pruning methods typically are m...
Johannes Fürnkranz
ICDAR
2009
IEEE
15 years 6 months ago
Capturing Reliable Data for Computer-Based Forensic Handwriting Analysis II: Pen-position Activations
The forensic investigation of a questioned signature written on a piece of paper is a challenging task. Electronic pen-tablets for recording writing movements are considered valua...
Katrin Franke