Sciweavers

1174 search results - page 132 / 235
» Derivation of Characteristic Formulae
Sort
View
FUIN
2007
147views more  FUIN 2007»
15 years 4 months ago
Privacy Preserving Database Generation for Database Application Testing
Testing of database applications is of great importance. Although various studies have been conducted to investigate testing techniques for database design, relatively few efforts ...
Xintao Wu, Yongge Wang, Songtao Guo, Yuliang Zheng
WIOPT
2010
IEEE
15 years 3 months ago
Evolutionary forwarding games in Delay Tolerant Networks
—In this paper, we apply evolutionary games to non-cooperative forwarding control of Delay Tolerant Networks (DTN). We focus our study on the probability to deliver a message fro...
Rachid El Azouzi, Francesco De Pellegrini, Vijay K...
WAIFI
2010
Springer
158views Mathematics» more  WAIFI 2010»
15 years 2 months ago
On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings
Abstract. We focus on the implementation and security aspects of cryptographic protocols that use Type 1 and Type 4 pairings. On the implementation front, we report improved timing...
Sanjit Chatterjee, Darrel Hankerson, Alfred Meneze...
IJCV
2010
223views more  IJCV 2010»
14 years 11 months ago
Anthropometric 3D Face Recognition
Abstract We present a novel anthropometric three dimensional (Anthroface 3D) face recognition algorithm, which is based on a systematically selected set of discriminatory structura...
Shalini Gupta, Mia K. Markey, Alan C. Bovik
ICDAR
2011
IEEE
14 years 4 months ago
Discovering Legible Chinese Typefaces for Reading Digital Documents
More and more fonts have sprung up in recent years in digital publishing industry and reading devices. In this paper, we focus on methods of evaluating digital Chinese fonts and t...
Bing Zhang, Ying Li, Ching Y. Suen, Xuemin Zhang