Sciweavers

1050 search results - page 40 / 210
» Two methods of authenticated positioning
Sort
View
SIGIR
2008
ACM
14 years 11 months ago
A study of methods for negative relevance feedback
Negative relevance feedback is a special case of relevance feedback where we do not have any positive example; this often happens when the topic is difficult and the search result...
Xuanhui Wang, Hui Fang, ChengXiang Zhai
AVBPA
2003
Springer
184views Biometrics» more  AVBPA 2003»
15 years 5 months ago
Biometric Template Selection: A Case Study in Fingerprints
Abstract. A biometric authentication system operates by acquiring biometric data from a user and comparing it against the template data stored in a database in order to identify a ...
Anil K. Jain, Umut Uludag, Arun Ross
USS
2008
15 years 2 months ago
Securing Frame Communication in Browsers
Many web sites embed third-party content in frames, relying on the browser's security policy to protect them from malicious content. Frames, however, are often insufficient i...
Adam Barth, Collin Jackson, John C. Mitchell
IPSN
2005
Springer
15 years 5 months ago
Attack-resistant location estimation in sensor networks
— Many sensor network applications require sensors’ locations to function correctly. Despite the recent advances, location discovery for sensor networks in hostile environments...
Donggang Liu, Peng Ning, Wenliang Du
ICASSP
2009
IEEE
15 years 6 months ago
Adaptive dereverberation of speech signals with speaker-position change detection
This paper proposes a method for adaptive speech dereverberation and speaker-position change detection, which have not previously been addressed. Signal transmission channels in r...
Takuya Yoshioka, Hideyuki Tachibana, Tomohiro Naka...