Sciweavers

340 search results - page 51 / 68
» On second order operators and quadratic operators
Sort
View
ECIS
2004
13 years 9 months ago
Perceived risk and trust associated with purchasing at electronic marketplaces
Understanding consumer behavior is of vital importance to consumer oriented e-business models today. In this paper we report on a study into the relationships between consumer per...
Tibert Verhagen, Yao-Hua Tan
ECSCW
2001
13 years 9 months ago
Supporting distributed software development by modes of collaboration
Work processes in team based software development need to be structured to minimise and resolve conflicting or divergent work. Current software development methodologies propose wa...
Till Schümmer, Jörg M. Haake
CCS
2008
ACM
13 years 8 months ago
Building castles out of mud: practical access pattern privacy and correctness on untrusted storage
We introduce a new practical mechanism for remote data storage with efficient access pattern privacy and correctness. A storage client can deploy this mechanism to issue encrypted...
Peter Williams, Radu Sion, Bogdan Carbunar
DAS
2010
Springer
13 years 7 months ago
A skeleton-based method for multi-oriented video text detection
In this paper, we propose a method based on the skeletonization operation for multi-oriented video text detection. The first step uses our existing Laplacian-based method to ident...
Trung Quy Phan, Palaiahnakote Shivakumara, Chew Li...
ICASSP
2010
IEEE
13 years 7 months ago
Widely and semi-widely linear processing of quaternion vectors
In this paper the two main definitions of quaternion properness (or second order circularity) are reviewed, showing their connection with the structure of the optimal quaternion ...
Javier Vía, David Ramírez, Ignacio S...