Sciweavers

4013 search results - page 490 / 803
» computer 2002
Sort
View
ICB
2009
Springer
156views Biometrics» more  ICB 2009»
15 years 3 months ago
Bipartite Biotokens: Definition, Implementation, and Analysis
Abstract. Cryptographic transactions form the basis of many common security systems found throughout computer networks. Supporting these transactions with biometrics is very desira...
Walter J. Scheirer, Terrance E. Boult
IPPS
2002
IEEE
15 years 10 months ago
A High Performance Algorithm for Incompressible Flows Using Local Solenoidal Functions
The convergence of iterative methods used to solve the linear systems arising in incompressible flow problems is sensitive to flow parameters such as the Reynolds number, time s...
Sreekanth R. Sambavaram, Vivek Sarin
CGA
2002
15 years 5 months ago
Unwrapping and Visualizing Cuneiform Tablets
Thousands of historically revealing cuneiform clay tablets, which were inscribed in Mesopotamia millenia ago, still exist today. Visualizing cuneiform writing is important when de...
Sean E. Anderson, Marc Levoy
DSN
2002
IEEE
15 years 10 months ago
32-Bit Cyclic Redundancy Codes for Internet Applications
Standardized 32-bit Cyclic Redundancy Codes provide fewer bits of guaranteed error detection than they could, achieving a Hamming Distance (HD) of only 4 for maximum-length Ethern...
Philip Koopman
CA
2002
IEEE
15 years 10 months ago
Evaluating Video-Based Motion Capture
Motion capture can be an effective method of creating realistic human motion for animation. Unfortunately, the quality demands for animation place challenging demands on a capture...
Michael Gleicher, Nicola J. Ferrier