Sciweavers

720 search results - page 140 / 144
» A Weighting Scheme for Star-Graphs
Sort
View
SODA
2003
ACM
114views Algorithms» more  SODA 2003»
13 years 9 months ago
Lower bounds for collusion-secure fingerprinting
Collusion-secure fingerprinting codes are an important primitive used by many digital watermarking schemes [1, 10, 9]. Boneh and Shaw [3] define a model for these types of codes...
Chris Peikert, Abhi Shelat, Adam Smith
BCSHCI
2009
13 years 9 months ago
Initial explorations into the user experience of 3D file browsing
We present an initial exploration into the usability of 3D file browsing. To explore the 3D file browsing technique design space, we analyzed the existing literature and developed...
Anamary Leal, Chadwick A. Wingrave, Joseph J. LaVi...
AI
2010
Springer
13 years 8 months ago
Elicitation strategies for soft constraint problems with missing preferences: Properties, algorithms and experimental studies
We consider soft constraint problems where some of the preferences may be unspecified. This models, for example, settings where agents are distributed and have privacy issues, or ...
Mirco Gelain, Maria Silvia Pini, Francesca Rossi, ...
BMCBI
2006
117views more  BMCBI 2006»
13 years 8 months ago
Analysis of gene expression changes in relation to toxicity and tumorigenesis in the livers of Big Blue transgenic rats fed comf
Background: Comfrey is consumed by humans as a vegetable and a tea, and has been used as an herbal medicine for more than 2000 years. Comfrey, however, is hepatotoxic in livestock...
Nan Mei, Lei Guo, Lu Zhang 0013, Leming M. Shi, Yo...
CGF
2007
157views more  CGF 2007»
13 years 8 months ago
Mesh Segmentation via Spectral Embedding and Contour Analysis
We propose a mesh segmentation algorithm via recursive bisection where at each step, a sub-mesh embedded in 3D is first spectrally projected into the plane and then a contour is ...
Rong Liu, Hao Zhang 0002