Sciweavers

92 search results - page 11 / 19
» Random non-cupping revisited
Sort
View
ISPEC
2010
Springer
13 years 11 months ago
Certificateless KEM and Hybrid Signcryption Schemes Revisited
Often authentication and confidentiality are required as simultaneous key requirements in many cryptographic applications. The cryptographic primitive called signcryption effective...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
ERCIMDL
2008
Springer
107views Education» more  ERCIMDL 2008»
13 years 11 months ago
Revisiting Lexical Signatures to (Re-)Discover Web Pages
A lexical signature (LS) is a small set of terms derived from a document that capture the "aboutness" of that document. A LS generated from a web page can be used to disc...
Martin Klein, Michael L. Nelson
BMVC
2000
13 years 11 months ago
The Cross Ratio: A Revisit to its Probability Density Function
The cross ratio has wide applications in computer vision because of its invariance under projective transformation. In active vision where the projections of quadruples of colline...
D. Q. Huynh
TMI
2010
133views more  TMI 2010»
13 years 8 months ago
Synthetic Magnetic Resonance Imaging Revisited
—Synthetic magnetic resonance (MR) imaging is an approach suggested in the literature to predict MR images at different design parameter settings from at least three observed MR ...
Ranjan Maitra, John J. Riddles
MANSCI
2010
108views more  MANSCI 2010»
13 years 4 months ago
Capacity Sizing Under Parameter Uncertainty: Safety Staffing Principles Revisited
We study a capacity sizing problem in a service system that is modeled as a single-class queue with multiple servers and where customers may renege while waiting for service. A sa...
Achal Bassamboo, Ramandeep S. Randhawa, Assaf J. Z...