Sciweavers

1050 search results - page 57 / 210
» Two methods of authenticated positioning
Sort
View
TREC
2008
15 years 1 months ago
DUTIR at TREC 2008 Blog Track
For opinion finding task our method of the combination of 5 Windows method and Pseudo Relevance Feedback behaves well, achieving an improvement of over 20% on the baseline adhoc r...
Jianmei Chen, Wei Guo, Fengming Pan, Fuyang Chang,...
MOBICOM
2012
ACM
13 years 2 months ago
Distinguishing users with capacitive touch communication
As we are surrounded by an ever-larger variety of post-PC devices, the traditional methods for identifying and authenticating users have become cumbersome and time-consuming. In t...
Tam Vu, Akash Baid, Simon Gao, Marco Gruteser, Ric...
MICCAI
2004
Springer
15 years 5 months ago
Immediate Ultrasound Calibration with Three Poses and Minimal Image Processing
Abstract. This paper introduces a novel method for ultrasound (US) probe calibration based on closed-form formulation and using minimal US imaging allowing for an immediate result....
Anand Viswanathan, Emad Boctor, Russell H. Taylor,...
ICIP
1994
IEEE
16 years 1 months ago
A Digital Watermark
This paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512*512 intensity image with an 8 bit gray scale. The watermark is capa...
Ron G. van Schyndel, Andrew Z. Tirkel, C. F. Osbor...
ICB
2007
Springer
117views Biometrics» more  ICB 2007»
15 years 3 months ago
Curvewise DET Confidence Regions and Pointwise EER Confidence Intervals Using Radial Sweep Methodology
One methodology for evaluating the matching performance of biometric authentication systems is the detection error tradeoff (DET) curve. The DET curve graphically illustrates the r...
Michael E. Schuckers, Yordan Minev, Andy Adler