Sciweavers

3941 search results - page 31 / 789
» Computational Efficiency of Batching Methods
Sort
View
CSI
2008
75views more  CSI 2008»
15 years 2 months ago
Identity-based universal designated multi-verifiers signature schemes
An identity-based (ID-based) universal designated verifier signature (ID-UDVS) scheme allows a signature holder to designate a specific verifier of the signature by using a simpli...
Seung-Hyun Seo, Jung Yeon Hwang, Kyu Young Choi, D...
117
Voted
ICPR
2004
IEEE
16 years 3 months ago
An Efficient Method to Detect Facial Fiducial Points for Face Recognition
In this paper a completely automatic face recognition system is presented. It consists of two main modules: in the first, the facial fiducial points are localized, and in the seco...
Stefano Arca, Paola Campadelli, Raffaella Lanzarot...
123
Voted
CSC
2006
15 years 4 months ago
Computational Algorithm for Higher Order Legendre Polynomial and Gaussian Quadrature Method
: - There are many numerical methods adopted to solve mathematical problems. Early researchers focused on the methods to reduce computational costs. In recent years, reduction in c...
Asif Mughal, Xiu Ye, Kamran Iqbal
101
Voted
ERSHOV
2006
Springer
15 years 6 months ago
Program Generation in the Equivalent Transformation Computation Model Using the Squeeze Method
In the equivalent transformation (ET) computation model, a specification provides background knowledge in a problem domain, a program is a set of prioritized rewriting rules, and c...
Kiyoshi Akama, Ekawit Nantajeewarawat, Hidekatsu K...
143
Voted
PVLDB
2010
122views more  PVLDB 2010»
14 years 9 months ago
ZINC: Efficient Indexing for Skyline Computation
We present a new indexing method named ZINC (for Z-order Indexing with Nested Code) that supports efficient skyline computation for data with both totally and partially ordered at...
Bin Liu, Chee-Yong Chan