Sciweavers

3305 search results - page 119 / 661
» Can we Rely on SQL
Sort
View
CANS
2010
Springer
146views Cryptology» more  CANS 2010»
13 years 8 months ago
Anonymous Credential Schemes with Encrypted Attributes
In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and later show these credentials to a relying party anonymously and without fully di...
Jorge Guajardo, Bart Mennink, Berry Schoenmakers
COLING
2010
13 years 5 months ago
Semantic Classification of Automatically Acquired Nouns using Lexico-Syntactic Clues
In this paper, we present a two-stage approach to acquire Japanese unknown morphemes from text with full POS tags assigned to them. We first acquire unknown morphemes only making ...
Yugo Murawaki, Sadao Kurohashi
ICPR
2008
IEEE
14 years 11 months ago
Robust extraction of 1D skeletons from grayscale 3D images
We propose novel thinning conditions for grayscale 3D images that do not rely on image thresholding or segmentation. The resulting grayscale skeletonization routine extracts a top...
Emilio R. Antúnez, Leonidas J. Guibas
ICIP
2009
IEEE
14 years 11 months ago
Fast Pseudo-enhancement Correction In Ct Colonography Using Linear Shift-invariant Filters
This paper presents a novel method to approximate shiftvariant Gaussian filtering of an image using a set of shiftinvariant Gaussian filters. This approximation affords filtering ...
RSKT
2009
Springer
14 years 4 months ago
Mechanisms of Partial Supervision in Rough Clustering Approaches
We bring two rough-set-based clustering algorithms into the framework of partially supervised clustering. A mechanism of partial supervision relying on either qualitative or quanti...
Rafael Falcón, Gwanggil Jeon, Kangjun Lee, ...