Sciweavers

12950 search results - page 2306 / 2590
» On Optimal Timed Strategies
Sort
View
CIARP
2003
Springer
15 years 9 months ago
Online Handwritten Signature Verification Using Hidden Markov Models
Most people are used to signing documents and because of this, it is a trusted and natural method for user identity verification, reducing the cost of password maintenance and decr...
Juan J. Igarza, Iñaki Goirizelaia, Koldo Es...
CP
2003
Springer
15 years 9 months ago
Cost-Based Filtering for Shorter Path Constraints
Abstract. Many real world problems, e.g. personnel scheduling and transportation planning, can be modeled naturally as Constrained Shortest Path Problems (CSPPs), i.e., as Shortest...
Meinolf Sellmann
CRYPTO
2003
Springer
90views Cryptology» more  CRYPTO 2003»
15 years 9 months ago
Password Interception in a SSL/TLS Channel
Simple password authentication is often used e.g. from an email software application to a remote IMAP server. This is frequently done in a protected peer-to-peer tunnel, e.g. by SS...
Brice Canvel, Alain P. Hiltgen, Serge Vaudenay, Ma...
ECML
2003
Springer
15 years 9 months ago
Robust k-DNF Learning via Inductive Belief Merging
A central issue in logical concept induction is the prospect of inconsistency. This problem may arise due to noise in the training data, or because the target concept does not fit...
Frédéric Koriche, Joël Quinquet...
EMMCVPR
2003
Springer
15 years 9 months ago
Curvature Vector Flow to Assure Convergent Deformable Models for Shape Modelling
Poor convergence to concave shapes is a main limitation of snakes as a standard segmentation and shape modelling technique. The gradient of the external energy of the snake represe...
Debora Gil, Petia Radeva
« Prev « First page 2306 / 2590 Last » Next »