Sciweavers

9245 search results - page 1462 / 1849
» Virtualization
Sort
View
184
Voted
AVBPA
2005
Springer
350views Biometrics» more  AVBPA 2005»
15 years 10 months ago
Pose Invariant Face Recognition Under Arbitrary Illumination Based on 3D Face Reconstruction
Pose and illumination changes from picture to picture are two main barriers toward full automatic face recognition. In this paper, a novel method to handle both pose and lighting c...
Xiujuan Chai, Laiyun Qing, Shiguang Shan, Xilin Ch...
158
Voted
AVBPA
2005
Springer
303views Biometrics» more  AVBPA 2005»
15 years 10 months ago
Indexing Biometric Databases Using Pyramid Technique
Abstract. Biometric identification has emerged as a reliable means of controlling access to both physical and virtual spaces. In spite of the rapid proliferation of large-scale dat...
Amit Mhatre, Sharat Chikkerur, Venu Govindaraju
CANS
2005
Springer
86views Cryptology» more  CANS 2005»
15 years 10 months ago
On the Performance and Analysis of DNS Security Extensions
The Domain Name System (DNS) is an essential component of the critical infrastructure of the Internet. The role of DNS is vital, as it is involved in virtually every Internet tran...
Reza Curtmola, Aniello Del Sorbo, Giuseppe Atenies...
DBISP2P
2005
Springer
129views Database» more  DBISP2P 2005»
15 years 10 months ago
Querying a Super-Peer in a Schema-Based Super-Peer Network
We propose a novel approach for de ning and querying a super-peer within a schema-based super-peer network organized into a two-level architecture: the low level, called the peer l...
Domenico Beneventano, Sonia Bergamaschi, Francesco...
140
Voted
ECOOP
2005
Springer
15 years 10 months ago
Derivation and Evaluation of Concurrent Collectors
There are many algorithms for concurrent garbage collection, but they are complex to describe, verify, and implement. This has resulted in a poor understanding of the relationships...
Martin T. Vechev, David F. Bacon, Perry Cheng, Dav...
« Prev « First page 1462 / 1849 Last » Next »