Sciweavers

211 search results - page 35 / 43
» How to present a paper in theoretical computer science: a sp...
Sort
View
TCOS
2010
13 years 2 months ago
J-PAKE: Authenticated Key Exchange without PKI
Password Authenticated Key Exchange (PAKE) is one of the important topics in cryptography. It aims to address a practical security problem: how to establish secure communication be...
Feng Hao, Peter Ryan
DIS
2010
Springer
13 years 6 months ago
Discovery of Conservation Laws via Matrix Search
Abstract. One of the main goals of Discovery Science is the development and analysis of methods for automatic knowledge discovery in the natural sciences. A central area of natural...
Oliver Schulte, Mark S. Drew
ACSC
2007
IEEE
14 years 1 months ago
Exploring Human Judgement of Digital Imagery
Statistical learning methods are commonly applied in content-based video and image retrieval. Such methods require a large number of examples which are usually obtained through a ...
Timo Volkmer, James A. Thom, Seyed M. M. Tahaghogh...
VISUALIZATION
2000
IEEE
13 years 11 months ago
Four-dimensional non-linear ray tracing as a visualization tool for gravitational physics
In this paper, general relativistic ray tracing is presented as a tool for gravitational physics. It is shown how standard three-dimensional ray tracing can be extended to allow f...
Daniel Weiskopf
WWW
2005
ACM
14 years 8 months ago
Topic segmentation of message hierarchies for indexing and navigation support
Message hierarchies in web discussion boards grow with new postings. Threads of messages evolve as new postings focus within or diverge from the original themes of the threads. Th...
Jong Wook Kim, K. Selçuk Candan, Mehmet Emi...