Sciweavers

988 search results - page 175 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
EUROCRYPT
2007
Springer
14 years 3 months ago
Feistel Networks Made Public, and Applications
Feistel Network, consisting of a repeated application of the Feistel Transform, gives a very convenient and popular method for designing “cryptographically strong” permutations...
Yevgeniy Dodis, Prashant Puniya
CIBCB
2006
IEEE
14 years 2 months ago
A Novel Graphical Model Approach to Segmenting Cell Images
— Successful biological image analysis usually requires satisfactory segmentations to identify regions of interest as an intermediate step. Here we present a novel graphical mode...
Shann-Ching Chen, Ting Zhao, Geoffrey J. Gordon, R...
CAIP
2005
Springer
212views Image Analysis» more  CAIP 2005»
14 years 2 months ago
3D Modeling of Humans with Skeletons from Uncalibrated Wide Baseline Views
In order to achieve precise, accurate and reliable tracking of human movement, a 3D human model that is very similar to the subject is essential. In this paper, we present a new sy...
Chee Kwang Quah, André Gagalowicz, Richard ...
CLEF
2005
Springer
14 years 2 months ago
Thomson Legal and Regulatory Experiments at CLEF-2005
For the 2005 Cross-Language Evaluation Forum, Thomson Legal and Regulatory participated in the Hungarian, French, and Portuguese monolingual search tasks as well as French-to-Port...
Isabelle Moulinier, Ken Williams
CIA
2004
Springer
14 years 2 months ago
Design and Implementation of Agent Community Based Peer-to-Peer Information Retrieval Method
This paper presents an agent community based peer-to-peer information retrieval method called ACP2P method[16] and discusses the experimental results of the method. The ACP2P metho...
Tsunenori Mine, Daisuke Matsuno, Akihiro Kogo, Mak...