Sciweavers

247 search results - page 37 / 50
» A New Cryptosystem Based On Hidden Order Groups
Sort
View
IUI
2004
ACM
14 years 4 days ago
Contextual contact retrieval
People routinely rely on physical and electronic systems to remind themselves of details regarding personal and organizational contacts. These systems include rolodexes, directori...
Jonathan Trevor, David M. Hilbert, Daniel Billsus,...
ICMI
2010
Springer
172views Biometrics» more  ICMI 2010»
13 years 4 months ago
Modelling and analyzing multimodal dyadic interactions using social networks
Social network analysis became a common technique used to model and quantify the properties of social interactions. In this paper, we propose an integrated framework to explore th...
Sergio Escalera, Petia Radeva, Jordi Vitrià...
IJAC
2011
12 years 10 months ago
The Subword Reversing Method
We summarize the main known results involving subword reversing, a method of semigroup theory for constructing van Kampen diagrams by referring to a preferred direction. In good ca...
Patrick Dehornoy
CONEXT
2007
ACM
13 years 10 months ago
On the cost of caching locator/ID mappings
Very recent activities in the IETF and in the Routing Research Group (RRG) of the IRTG focus on defining a new Internet architecture, in order to solve scalability issues related ...
Luigi Iannone, Olivier Bonaventure
ICIP
2003
IEEE
14 years 8 months ago
Design of Q-shift complex wavelets for image processing using frequency domain energy minimization
This paper proposes a new method of designing finitesupport wavelet filters, based on minimization of energy in key parts of the frequency domain. In particular this technique is ...
Nick G. Kingsbury