Sciweavers

1050 search results - page 6 / 210
» Two methods of authenticated positioning
Sort
View
WEBNET
2000
14 years 11 months ago
Electronic Portfolios in Assessment of Preservice Teachers
: Portfolios are valuable authentic assessment tools in preservice teacher education programs, as they allow for student demonstration of performance, interconnected tasks, respons...
Scott Walker
ICCS
2007
Springer
15 years 3 months ago
Two Extensions of Data Assimilation by Field Alignment
Abstract. Classical formulations of data-assimilation perform poorly when forecast locations of weather systems are displaced from their observations. They compensate position erro...
Sai Ravela
DIM
2008
ACM
14 years 11 months ago
Quantifying the security of preference-based authentication
We describe a technique aimed at addressing longstanding problems for password reset: security and cost. In our approach, users are authenticated using their preferences. Experime...
Markus Jakobsson, Liu Yang, Susanne Wetzel
ADT
2010
14 years 7 months ago
Survey of NLOS identification and error mitigation problems in UWB-based positioning algorithms for dense environments
Abstract In this survey, the currently available ultrawideband-based non-line-of-sight (NLOS) identification and error mitigation methods are presented. They are classified into se...
Jasurbek Khodjaev, Yongwan Park, Aamir Saeed Malik
IWBRS
2005
Springer
134views Biometrics» more  IWBRS 2005»
15 years 3 months ago
Using Score Normalization to Solve the Score Variation Problem in Face Authentication
Abstract. This paper investigates the score normalization technique for enhancing the performance of face authentication. We firstly discuss the thresholding approach for face auth...
Fei Yang, Shiguang Shan, Bingpeng Ma, Xilin Chen, ...