Sciweavers

2487 search results - page 187 / 498
» cases 2009
Sort
View
99
Voted
COST
2009
Springer
155views Multimedia» more  COST 2009»
15 years 7 months ago
Multi-biometric Fusion for Driver Authentication on the Example of Speech and Face
Nowadays biometrics becomes an important field in IT security, safety and comfort research for automotive. Aims are automatic driver authentication or recognition of spoken command...
Tobias Scheidat, Michael Biermann, Jana Dittmann, ...
CRYPTO
2009
Springer
89views Cryptology» more  CRYPTO 2009»
15 years 7 months ago
Linear Algebra with Sub-linear Zero-Knowledge Arguments
We suggest practical sub-linear size zero-knowledge arguments for statements involving linear algebra. Given commitments to matrices over a finite field, we give a sub-linear siz...
Jens Groth
CSL
2009
Springer
15 years 7 months ago
On the Relation between Sized-Types Based Termination and Semantic Labelling
We investigate the relationship between two independently developed termination techniques for rst and higher-order rewrite systems. On the one hand, sized-types based termination...
Frédéric Blanqui, Cody Roux
CSR
2009
Springer
15 years 7 months ago
On Random Ordering Constraints
Abstract. Ordering constraints are analogous to instances of the satisfiability problem in conjunctive normalform, but instead of a boolean assignment we consider a linear orderin...
Andreas Goerdt
101
Voted
DFG
2009
Springer
15 years 7 months ago
A Survey on Approximation Algorithms for Scheduling with Machine Unavailability
In this chapter we present recent contributions in the field of sequential job scheduling on network machines which work in parallel; these are subject to temporary unavailability...
Florian Diedrich, Klaus Jansen, Ulrich M. Schwarz,...