Sciweavers

43264 search results - page 116 / 8653
» Comparing models of computation
Sort
View
ICPR
2010
IEEE
13 years 6 months ago
Improving Classification Accuracy by Comparing Local Features through Canonical Correlations
Classifying images using features extracted from densely sampled local patches has enjoyed significant success in many detection and recognition tasks. It is also well known that ...
Mert Dikmen, Thomas S. Huang
JCS
2011
126views more  JCS 2011»
13 years 3 months ago
Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey
One of the main challenges in pervasive computing is how we can establish secure communication over an untrusted high-bandwidth network without any initial knowledge or a Public K...
L. H. Nguyen, A. W. Roscoe
PR
2007
176views more  PR 2007»
13 years 8 months ago
A computer vision method to locate cold spots in foods in microwave sterilization processes
A major challenge in developing advanced thermal processess based on electromagnetic heating is to determine the location of cold spots in foods. A rapid and reliable method was d...
Ram Bhuwan Pandit, Juming Tang, Frank Liu, Galina ...
BMCBI
2010
118views more  BMCBI 2010»
13 years 9 months ago
Computing H/D-Exchange rates of single residues from data of proteolytic fragments
Background: Protein conformation and protein/protein interaction can be elucidated by solution-phase Hydrogen/ Deuterium exchange (sHDX) coupled to high-resolution mass analysis o...
Ernst Althaus, Stefan Canzar, Carsten Ehrler, Mark...
EUROCRYPT
2007
Springer
14 years 3 months ago
Universally Composable Multi-party Computation Using Tamper-Proof Hardware
Protocols proven secure within the universal composability (UC) framework satisfy strong and desirable security properties. Unfortunately, it is known that within the “plain” m...
Jonathan Katz