Sciweavers

884 search results - page 124 / 177
» Algorithms for Implicit Deformable Models
Sort
View
106
Voted
CTRSA
2007
Springer
110views Cryptology» more  CTRSA 2007»
15 years 8 months ago
Selecting Secure Passwords
We mathematically explore a model for the shortness and security for passwords that are stored in hashed form. The model is implicitly in the NIST publication [8] and is based on c...
Eric R. Verheul
SENSYS
2004
ACM
15 years 8 months ago
Decentralized synchronization protocols with nearest neighbor communication
A class of synchronization protocols for dense, large-scale sensor networks is presented. The protocols build on the recent work of Hong, Cheow, and Scaglione [5, 6] in which the ...
Dennis Lucarelli, I-Jeng Wang
119
Voted
AIRS
2006
Springer
15 years 6 months ago
Natural Document Clustering by Clique Percolation in Random Graphs
Document clustering techniques mostly depend on models that impose explicit and/or implicit priori assumptions as to the number, size, disjunction characteristics of clusters, and/...
Wei Gao, Kam-Fai Wong
112
Voted
WSCG
2004
139views more  WSCG 2004»
15 years 4 months ago
Clustering in Virtual Plant Ecosystems
The spatial plant distribution in virtual ecosystems is usually modeled by means of artificial life. Each plant is considered as a solitary element competing for its resources and...
Bedrich Benes, J. M. Soto Guerrero
ECCV
2006
Springer
16 years 4 months ago
Detecting Instances of Shape Classes That Exhibit Variable Structure
This paper proposes a method for detecting instances of shape classes that exhibit variable structure. The term "variable structure" is used to characterize shape classes...
Vassilis Athitsos, Jingbin Wang, Stan Sclaroff, Ma...