Sciweavers

5740 search results - page 996 / 1148
» Application of Level Set Methods in Computer Vision
Sort
View
EUROPKI
2004
Springer
14 years 3 months ago
On the Use of Weber Polynomials in Elliptic Curve Cryptography
Abstract. In many cryptographic applications it is necessary to generate elliptic curves (ECs) with certain security properties. These curves are commonly constructed using the Com...
Elisavet Konstantinou, Yannis C. Stamatiou, Christ...
CORR
2010
Springer
195views Education» more  CORR 2010»
13 years 10 months ago
Dynamic management of transactions in distributed real-time processing system
Managing the transactions in real time distributed computing system is not easy, as it has heterogeneously networked computers to solve a single problem. If a transaction runs acr...
Y. Jayanta Singh, Yumnam Somananda Singh, Ashok Ga...
VIS
2004
IEEE
148views Visualization» more  VIS 2004»
14 years 11 months ago
Detection and Visualization of Anomalous Structures in Molecular Dynamics Simulation Data
In this article we explore techniques to detect and visualize features in data from molecular dynamics (MD) simulations. Although the techniques proposed are general, we focus on ...
John Wilkins, Kaden Hazzard, Raghu Machiraju, Same...
KDD
2008
ACM
135views Data Mining» more  KDD 2008»
14 years 10 months ago
Effective and efficient itemset pattern summarization: regression-based approaches
In this paper, we propose a set of novel regression-based approaches to effectively and efficiently summarize frequent itemset patterns. Specifically, we show that the problem of ...
Ruoming Jin, Muad Abu-Ata, Yang Xiang, Ning Ruan
AMFG
2005
IEEE
314views Biometrics» more  AMFG 2005»
14 years 3 months ago
Two-Dimensional Non-negative Matrix Factorization for Face Representation and Recognition
Non-negative matrix factorization (NMF) is a recently developed method for finding parts-based representation of non-negative data such as face images. Although it has successfully...
Daoqiang Zhang, Songcan Chen, Zhi-Hua Zhou