Sciweavers

526 search results - page 51 / 106
» On circularly symmetric functions
Sort
View
EUROCRYPT
2001
Springer
14 years 2 months ago
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
Abstract. We present a formalism for the analysis of key-exchange protocols that combines previous definitional approaches and results in a definition of security that enjoys som...
Ran Canetti, Hugo Krawczyk
CVPR
2006
IEEE
14 years 4 months ago
A Shape Representation for Planar Curves by Shape Signature Harmonic Embedding
This paper introduces a new representation for planar curves. From the well-known Dirichlet problem for a disk, the harmonic function embedded in a circular disk is solely depende...
Sang-Mook Lee, A. Lynn Abbott, Neil A. Clark, Phil...
ICMCS
2006
IEEE
185views Multimedia» more  ICMCS 2006»
14 years 4 months ago
Lossless Visible Watermarking
The embedding distortion of visible watermarking is usually larger than that of invisible watermarking. In order to maintain the signal fidelity after the watermark extraction, ...
Shu-Kei Yip, Oscar C. Au, Chi-Wang Ho, Hoi-Ming Wo...
GECCO
2005
Springer
113views Optimization» more  GECCO 2005»
14 years 3 months ago
Factors governing the behavior of multiple cooperating swarms
This paper investigates the idea of having multiple swarms working separately and cooperating with each other to solve an optimization problem. Many factors that influence the be...
Mohammed El-Abd, Mohamed Kamel
WABI
2001
Springer
138views Bioinformatics» more  WABI 2001»
14 years 2 months ago
Algorithms for Finding Gene Clusters
Abstract. Comparing gene orders in completely sequenced genomes is a standard approach to locate clusters of functionally associated genes. Often, gene orders are modeled as permut...
Steffen Heber, Jens Stoye