Sciweavers

25156 search results - page 5014 / 5032
» Applications for conscious systems
Sort
View
IJNSEC
2011
145views more  IJNSEC 2011»
13 years 2 months ago
Symmetric Key Image Encryption Scheme with Key Sequences Derived from Random Sequence of Cyclic Elliptic Curve Points
In this paper, cyclic elliptic curves of the form y2 + xy = x3 + ax2 + b, a, b ∈ GF(2m ) with order M is considered in the design of a Symmetric Key Image Encryption Scheme with...
S. V. Sathyanarayana, M. Aswatha Kumar, K. N. Hari...
JBI
2011
233views Bioinformatics» more  JBI 2011»
13 years 2 months ago
A set of ontologies to drive tools for the control of vector-borne diseases
We are developing a set of ontologies that deal with vector-borne diseases and the arthropod vectors that transmit them. For practical reasons (application priorities), we initiat...
Pantelis Topalis, Emmanuel Dialynas, Elvira Mitrak...
JMLR
2011
187views more  JMLR 2011»
13 years 2 months ago
Robust Statistics for Describing Causality in Multivariate Time Series
A widely agreed upon definition of time series causality inference, established in the seminal 1969 article of Clive Granger (1969), is based on the relative ability of the histor...
Florin Popescu
PAMI
2011
13 years 2 months ago
Eye Movement Analysis for Activity Recognition Using Electrooculography
—In this work, we investigate eye movement analysis as a new sensing modality for activity recognition. Eye movement data were recorded using an electrooculography (EOG) system. ...
Andreas Bulling, Jamie A. Ward, Hans Gellersen, Ge...
TKDE
2011
168views more  TKDE 2011»
13 years 2 months ago
On Computing Farthest Dominated Locations
—In reality, spatial objects (e.g., hotels) not only have spatial locations but also have quality attributes (e.g., price, star). An object p is said to dominate another one p , ...
Hua Lu, Man Lung Yiu
« Prev « First page 5014 / 5032 Last » Next »