Sciweavers

4529 search results - page 884 / 906
» Position Based Cryptography
Sort
View
SMA
2008
ACM
149views Solid Modeling» more  SMA 2008»
15 years 28 days ago
Exact arrangements on tori and Dupin cyclides
An algorithm and implementation is presented to compute the exact arrangement induced by arbitrary algebraic surfaces on a parametrized ring Dupin cyclide. The family of Dupin cyc...
Eric Berberich, Michael Kerber
127
Voted
TCBB
2008
115views more  TCBB 2008»
15 years 28 days ago
Highly Scalable Genotype Phasing by Entropy Minimization
A Single Nucleotide Polymorphism (SNP) is a position in the genome at which two or more of the possible four nucleotides occur in a large percentage of the population. SNPs accoun...
Alexander Gusev, Ion I. Mandoiu, Bogdan Pasaniuc
82
Voted
INFSOF
2007
116views more  INFSOF 2007»
15 years 28 days ago
An analysis of the most cited articles in software engineering journals - 2000
Citations and related work are crucial in any research to position the work and to build on the work of others. A high citation count is an indication of the influence of speciï¬...
Claes Wohlin
116
Voted
TIFS
2008
200views more  TIFS 2008»
15 years 28 days ago
Color Image Watermarking Using Multidimensional Fourier Transforms
This paper presents two vector watermarking schemes that are based on the use of complex and quaternion Fourier transforms and demonstrates, for the first time, how to embed waterm...
Tsz Kin Tsui, Xiao-Ping Zhang, Dimitrios Androutso...
132
Voted
TIP
2008
169views more  TIP 2008»
15 years 28 days ago
Weakly Supervised Learning of a Classifier for Unusual Event Detection
In this paper, we present an automatic classification framework combining appearance based features and Hidden Markov Models (HMM) to detect unusual events in image sequences. One...
Mark Jager, Christian Knoll, Fred A. Hamprecht