Sciweavers

888 search results - page 130 / 178
» Digital detective - Bluetooth
Sort
View
SAC
2003
ACM
14 years 2 months ago
Image Retrieval With Embedded Region Relationships
Image retrieval based on content from digital libraries, multimedia databases, the Internet, and other sources has been an important problem addressed by several researchers. In t...
Sharat Chandran, Naga Kiran
ACNS
2003
Springer
131views Cryptology» more  ACNS 2003»
14 years 2 months ago
On the Security of Two Threshold Signature Schemes with Traceable Signers
A (t, n) threshold signature scheme allows t or more group members to generate signatures on behalf of a group with n members, while any t−1 or less members cannot do the same th...
Guilin Wang, Xiaoxi Han, Bo Zhu
ERCIMDL
2003
Springer
114views Education» more  ERCIMDL 2003»
14 years 2 months ago
Identifying Useful Passages in Documents Based on Annotation Patterns
Many readers annotate passages that are important to their work. If we understand the relationship between the types of marks on a passage and the passage’s ultimate utility in a...
Frank M. Shipman III, Morgan N. Price, Catherine C...
EUROCAST
2003
Springer
130views Hardware» more  EUROCAST 2003»
14 years 2 months ago
A Model of Neural Inspiration for Local Accumulative Computation
This paper explores the computational capacity of a novel local computational model that expands the conventional analogical and logical dynamic neural models, based on the charge ...
José Mira, Miguel Angel Fernández, M...
CW
2002
IEEE
14 years 1 months ago
Direct Segmentation for Reverse Engineering
In Reverse Engineering a physical object is digitally reconstructed from a set of boundary points. In the segmentation phase these points are grouped into subsets to facilitate co...
Marek Vanco, Guido Brunnett