Sciweavers

1599 search results - page 175 / 320
» Probabilistic Analysis of Anonymity
Sort
View
ICMCS
1999
IEEE
202views Multimedia» more  ICMCS 1999»
14 years 17 days ago
Face Detection in Color Images Using Wavelet Packet Analysis
In this paper, we propose a novel scheme for automatic and fast detection of human faces in color images where the number, the location, the orientation and the size of the faces ...
Christophe Garcia, G. Zikos, George Tziritas
3DOR
2008
13 years 10 months ago
Markov Random Fields for Improving 3D Mesh Analysis and Segmentation
Mesh analysis and clustering have became important issues in order to improve the efficiency of common processing operations like compression, watermarking or simplification. In t...
Guillaume Lavoué, Christian Wolf
CMSB
2008
Springer
13 years 10 months ago
Stochastic Analysis of Amino Acid Substitution in Protein Synthesis
Abstract. We present a formal analysis of amino acid replacement during mRNA translation. Building on an abstract stochastic model of arrival of tRNAs and their processing at the r...
Dragan Bosnacki, Huub M. M. ten Eikelder, M. N. St...
CSCLP
2008
Springer
13 years 10 months ago
Challenges in Constraint-Based Analysis of Hybrid Systems
In the analysis of hybrid discrete-continuous systems, rich arithmetic constraint formulae with complex Boolean structure arise naturally. The iSAT algorithm, a solver for such for...
Andreas Eggers, Natalia Kalinnik, Stefan Kupfersch...
CORR
2006
Springer
104views Education» more  CORR 2006»
13 years 8 months ago
Modeling Adversaries in a Logic for Security Protocol Analysis
Logics for security protocol analysis require the formalization of an adversary model that specifies the capabilities of adversaries. A common model is the Dolev-Yao model, which c...
Joseph Y. Halpern, Riccardo Pucella