Sciweavers

4529 search results - page 884 / 906
» Position Based Cryptography
Sort
View
SMA
2008
ACM
149views Solid Modeling» more  SMA 2008»
13 years 11 months ago
Exact arrangements on tori and Dupin cyclides
An algorithm and implementation is presented to compute the exact arrangement induced by arbitrary algebraic surfaces on a parametrized ring Dupin cyclide. The family of Dupin cyc...
Eric Berberich, Michael Kerber
TCBB
2008
115views more  TCBB 2008»
13 years 11 months ago
Highly Scalable Genotype Phasing by Entropy Minimization
A Single Nucleotide Polymorphism (SNP) is a position in the genome at which two or more of the possible four nucleotides occur in a large percentage of the population. SNPs accoun...
Alexander Gusev, Ion I. Mandoiu, Bogdan Pasaniuc
INFSOF
2007
116views more  INFSOF 2007»
13 years 11 months ago
An analysis of the most cited articles in software engineering journals - 2000
Citations and related work are crucial in any research to position the work and to build on the work of others. A high citation count is an indication of the influence of speciï¬...
Claes Wohlin
TIFS
2008
200views more  TIFS 2008»
13 years 10 months ago
Color Image Watermarking Using Multidimensional Fourier Transforms
This paper presents two vector watermarking schemes that are based on the use of complex and quaternion Fourier transforms and demonstrates, for the first time, how to embed waterm...
Tsz Kin Tsui, Xiao-Ping Zhang, Dimitrios Androutso...
TIP
2008
169views more  TIP 2008»
13 years 10 months ago
Weakly Supervised Learning of a Classifier for Unusual Event Detection
In this paper, we present an automatic classification framework combining appearance based features and Hidden Markov Models (HMM) to detect unusual events in image sequences. One...
Mark Jager, Christian Knoll, Fred A. Hamprecht