Sciweavers

1086 search results - page 143 / 218
» Knowledge-based part correspondence
Sort
View
IJNSEC
2007
164views more  IJNSEC 2007»
13 years 10 months ago
A Biometric Identity Based Signature Scheme
We describe an identity based signature scheme that uses biometric information to construct the public key. Such a scheme would be beneficial in many repudiation situations for e...
Andrew Burnett, Fergus Byrne, Tom Dowling, Adam Du...
SPE
2008
91views more  SPE 2008»
13 years 10 months ago
A multiple layer model to compare RNA secondary structures
composed of various graphs linked together by relations of abstraction/refinement. The new structure is useful for representing information that can be described at t levels of abs...
Julien Allali, Marie-France Sagot
TSMC
2008
172views more  TSMC 2008»
13 years 10 months ago
AdaBoost-Based Algorithm for Network Intrusion Detection
Abstract--Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security sy...
Weiming Hu, Wei Hu, Stephen J. Maybank
AAMAS
2004
Springer
13 years 10 months ago
From a Conceptual Framework for Agents and Objects to a Multi-Agent System Modeling Language
In this paper we propose a multi-agent system modeling language (MAS-ML) that extends UML (Unified Modeling Language) based on structural and dynamic properties presented in a conc...
Viviane Torres da Silva, Carlos José Pereir...
VC
2008
118views more  VC 2008»
13 years 10 months ago
Enriching a motion database by analogous combination of partial human motions
We synthesize new human body motions from existing motion data. We divide the body of an animated character into several parts, such as to upper and lower body, and partition the m...
Won-Seob Jang, Won-Kyu Lee, In-Kwon Lee, Jehee Lee