Sciweavers

1184 search results - page 134 / 237
» Nearness relations and topology
Sort
View
EUROCRYPT
2001
Springer
14 years 2 months ago
On Perfect and Adaptive Security in Exposure-Resilient Cryptography
Abstract. We consider the question of adaptive security for two related cryptographic primitives: all-or-nothing transforms and exposureresilient functions. Both are concerned with...
Yevgeniy Dodis, Amit Sahai, Adam Smith
DOCENG
2005
ACM
13 years 12 months ago
Generative semantic clustering in spatial hypertext
This paper presents an iterative method for generative semantic clustering of related information elements in spatial hypertext documents. The goal is to automatically organize th...
Andruid Kerne, Eunyee Koh, Vikram Sundaram, J. Mic...

Publication
655views
15 years 8 months ago
The Effects of Bus Stop Consolidation on Passenger Activity and transit Operations
This research addressed changes in passenger activity and operating performance after implementation of a bus stop consolidation project at TriMet, the regional transit provider fo...
A. M. El-Geneidy, J. G. Strathman, T. J. Kimpel, D...
ECCV
2008
Springer
14 years 12 months ago
Analysis of Building Textures for Reconstructing Partially Occluded Facades
Abstract. As part of an architectural modeling project, this paper investigates the problem of understanding and manipulating images of buildings. Our primary motivation is to auto...
Thommen Korah, Christopher Rasmussen
DAC
1998
ACM
14 years 11 months ago
Watermarking Techniques for Intellectual Property Protection
Digital system designs are the product of valuable effort and knowhow. Their embodiments, from software and HDL program down to device-level netlist and mask data, represent caref...
Andrew B. Kahng, John Lach, William H. Mangione-Sm...