Sciweavers

133 search results - page 21 / 27
» Efficient Detection of Unusual Words
Sort
View
FDTC
2006
Springer
80views Cryptology» more  FDTC 2006»
14 years 2 months ago
Robust Finite Field Arithmetic for Fault-Tolerant Public-Key Cryptography
We present a new approach to fault tolerant public key cryptography based on redundant arithmetic in finite rings. Redundancy is achieved by embedding non-redundant field or ring ...
Gunnar Gaubatz, Berk Sunar
IQ
2007
14 years 9 days ago
Data Quality Aspects Of Revenue Assurance
: Revenue Assurance describes a methodology to increase a company’s income by determining where revenue gets lost, and to maximize their profits by eliminating revenue leakage an...
Katharina Baamann
SIGGRAPH
1990
ACM
14 years 2 months ago
Curved surfaces and coherence for non-penetrating rigid body simulation
A formulation for the contact forces between curved surfaces in resting (non-colliding) contact is presented. In contrast to previous formulations, constraints on the allowable ta...
David Baraff
ACIVS
2007
Springer
14 years 2 months ago
A Multi-agent Approach for Range Image Segmentation with Bayesian Edge Regularization
Abstract. We present and evaluate in this paper a multi-agent approach for range image segmentation. The approach consists in using autonomous agents for the segmentation of a rang...
Smaine Mazouzi, Zahia Guessoum, Fabien Michel, Moh...
CVPR
2007
IEEE
15 years 27 days ago
Incorporating On-demand Stereo for Real Time Recognition
A new method for localising and recognising hand poses and objects in real-time is presented. This problem is important in vision-driven applications where it is natural for a use...
Thomas Deselaers, Antonio Criminisi, John M. Winn,...