Sciweavers

5740 search results - page 1011 / 1148
» Application of Level Set Methods in Computer Vision
Sort
View
CEEMAS
2005
Springer
14 years 3 months ago
Multiagents Applied to Humanitarian Demining
Abstract. The complexity associated to Humanitarian Demining becomes very high due to its broad set of activities, which beyond the already complex of landmine removal, includes ot...
Pedro Santana, José Barata, Luís Flo...
PKC
2005
Springer
93views Cryptology» more  PKC 2005»
14 years 3 months ago
Optimizing Robustness While Generating Shared Secret Safe Primes
We develop a method for generating shared, secret, safe primes applicable to use in threshold RSA signature schemes such as the one developed by Shoup. We would like a scheme usabl...
Emil Ong, John Kubiatowicz
DAWAK
2004
Springer
14 years 3 months ago
Mining Periodic Patterns in Sequence Data
Abstract. Periodic pattern mining is the problem that regards temporal regularity. There are many emerging applications in periodic pattern mining, including web usage recommendati...
Kuo-Yu Huang, Chia-Hui Chang
VLDB
1999
ACM
159views Database» more  VLDB 1999»
14 years 2 months ago
Aggregation Algorithms for Very Large Compressed Data Warehouses
Many efficient algorithms to compute multidimensional aggregation and Cube for relational OLAP have been developed. However, to our knowledge, there is nothing to date in the lite...
Jianzhong Li, Doron Rotem, Jaideep Srivastava
ECAI
2000
Springer
14 years 1 months ago
Qualitative Spatial Reasoning about Line Segments
Abstract. Representing and reasoning about orientation information is an important aspect of qualitative spatial reasoning. We present a novel approach for dealing with intrinsic o...
Reinhard Moratz, Jochen Renz, Diedrich Wolter
« Prev « First page 1011 / 1148 Last » Next »