Sciweavers

3941 search results - page 31 / 789
» Computational Efficiency of Batching Methods
Sort
View
CSI
2008
75views more  CSI 2008»
13 years 9 months ago
Identity-based universal designated multi-verifiers signature schemes
An identity-based (ID-based) universal designated verifier signature (ID-UDVS) scheme allows a signature holder to designate a specific verifier of the signature by using a simpli...
Seung-Hyun Seo, Jung Yeon Hwang, Kyu Young Choi, D...
ICPR
2004
IEEE
14 years 10 months ago
An Efficient Method to Detect Facial Fiducial Points for Face Recognition
In this paper a completely automatic face recognition system is presented. It consists of two main modules: in the first, the facial fiducial points are localized, and in the seco...
Stefano Arca, Paola Campadelli, Raffaella Lanzarot...
CSC
2006
13 years 10 months ago
Computational Algorithm for Higher Order Legendre Polynomial and Gaussian Quadrature Method
: - There are many numerical methods adopted to solve mathematical problems. Early researchers focused on the methods to reduce computational costs. In recent years, reduction in c...
Asif Mughal, Xiu Ye, Kamran Iqbal
ERSHOV
2006
Springer
14 years 14 days ago
Program Generation in the Equivalent Transformation Computation Model Using the Squeeze Method
In the equivalent transformation (ET) computation model, a specification provides background knowledge in a problem domain, a program is a set of prioritized rewriting rules, and c...
Kiyoshi Akama, Ekawit Nantajeewarawat, Hidekatsu K...
PVLDB
2010
122views more  PVLDB 2010»
13 years 3 months ago
ZINC: Efficient Indexing for Skyline Computation
We present a new indexing method named ZINC (for Z-order Indexing with Nested Code) that supports efficient skyline computation for data with both totally and partially ordered at...
Bin Liu, Chee-Yong Chan