Sciweavers

1512 search results - page 173 / 303
» When Suboptimal Rules
Sort
View
MCS
2004
Springer
15 years 4 months ago
High Security Fingerprint Verification by Perceptron-Based Fusion of Multiple Matchers
Recent works about perceptron-based fusion of multiple fingerprint matchers showed the effectiveness of such approach in improving the performance of personal identity verification...
Gian Luca Marcialis, Fabio Roli
MDM
2004
Springer
15 years 4 months ago
Enabling Context-Aware and Privacy-Conscious User Data Sharing
This paper provides detail on two key components of the Houdini framework under development at Bell Labs, that enable context-aware and privacy-conscious user data sharing appropr...
Richard Hull, Bharat Kumar, Daniel F. Lieuwen, Pet...
SAS
2004
Springer
103views Formal Methods» more  SAS 2004»
15 years 4 months ago
Information Flow Analysis in Logical Form
Abstract. We specify an information flow analysis for a simple imperative language, using a Hoare-like logic. The logic facilitates static checking of a larger class of programs t...
Torben Amtoft, Anindya Banerjee
CHARME
2003
Springer
103views Hardware» more  CHARME 2003»
15 years 4 months ago
Linear and Nonlinear Arithmetic in ACL2
Abstract. As of version 2.7, the ACL2 theorem prover has been extended to automatically verify sets of polynomial inequalities that include nonlinear relationships. In this paper w...
Warren A. Hunt Jr., Robert Bellarmine Krug, J. Str...
CIVR
2003
Springer
196views Image Analysis» more  CIVR 2003»
15 years 4 months ago
Audio-Based Event Detection for Sports Video
Abstract. In this paper, we present an audio-based event detection approach shown to be effective when applied to the Sports broadcast data. The main benefit of this approach is ...
Mark Baillie, Joemon M. Jose