Sciweavers

356 search results - page 28 / 72
» A computational approach to negative priming
Sort
View
DIM
2008
ACM
13 years 9 months ago
Quantifying the security of preference-based authentication
We describe a technique aimed at addressing longstanding problems for password reset: security and cost. In our approach, users are authenticated using their preferences. Experime...
Markus Jakobsson, Liu Yang, Susanne Wetzel
BMCBI
2010
112views more  BMCBI 2010»
13 years 7 months ago
Computational identification of rare codons of Escherichia coli based on codon pairs preference
Background: Codon bias is believed to play an important role in the control of gene expression. In Escherichia coli, some rare codons, which can limit the expression level of exog...
Xianming Wu, Songfeng Wu, Dong Li, Jiyang Zhang, L...
DAC
1997
ACM
13 years 11 months ago
Equivalence Checking Using Cuts and Heaps
This paper presents a verification technique which is specifically targeted to formally comparing large combinational circuits with some structural similarities. The approach co...
Andreas Kuehlmann, Florian Krohm
DAGM
2009
Springer
13 years 11 months ago
An Efficient Linear Method for the Estimation of Ego-Motion from Optical Flow
Abstract. Approaches to visual navigation, e.g. used in robotics, require computationally efficient, numerically stable, and robust methods for the estimation of ego-motion. One of...
Florian Raudies, Heiko Neumann
ICIAR
2009
Springer
14 years 2 months ago
Scale Invariant Feature Transform with Irregular Orientation Histogram Binning
The SIFT (Scale Invariant Feature Transform) descriptor is a widely used method for matching image features. However, perfect scale invariance can not be achieved in practice becau...
Yan Cui, Nils Hasler, Thorsten Thormählen, Ha...