Sciweavers

2542 search results - page 150 / 509
» One step ahead
Sort
View
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
13 years 11 months ago
An Authentication Scheme Based on the Twisted Conjugacy Problem
The conjugacy search problem in a group G is the problem of recovering an x G from given g G and h = x-1 gx. The alleged computational hardness of this problem in some groups was...
Vladimir Shpilrain, Alexander Ushakov
ADC
2008
Springer
153views Database» more  ADC 2008»
13 years 11 months ago
A Confidence Based Recognition System for TV Commercial Extraction
Automatic real-time recognition of TV commercials is an essential step for TV broadcast monitoring. It comprises two basic tasks: rapid detection of known commercials that are sto...
Yijun Li, Dianqing Zhang, Xiangmin Zhou, Jesse S. ...
OPODIS
2004
13 years 11 months ago
Robust Topology Control Protocols
Topology control protocols attempt to reduce the energy consumption of nodes in an ad-hoc wireless network while maintaining sufficient network connectivity. Topology control proto...
Sukumar Ghosh, Kevin M. Lillis, Saurav Pandit, Sri...
BMCBI
2005
140views more  BMCBI 2005»
13 years 9 months ago
JACOP: A simple and robust method for the automated classification of protein sequences with modular architecture
Background: Whole-genome sequencing projects are rapidly producing an enormous number of new sequences. Consequently almost every family of proteins now contains hundreds of membe...
Peter Sperisen, Marco Pagni
ICIP
2010
IEEE
13 years 7 months ago
Hierarchical multiscale LBP for face and palmprint recognition
Local binary pattern (LBP), fast and simple for implementation, has shown its superiority in face and palmprint recognition. To extract representative features, "uniform"...
Zhenhua Guo, Lei Zhang, David Zhang, Xuanqin Mou