Sciweavers

7351 search results - page 1447 / 1471
» Segmenting Point Sets
Sort
View
ENTCS
2006
134views more  ENTCS 2006»
13 years 7 months ago
Anonymity in Probabilistic and Nondeterministic Systems
Anonymity means that the identity of the user performing a certain action is maintained secret. The protocols for ensuring anonymity often use random mechanisms which can be descr...
Catuscia Palamidessi
BMCBI
2007
107views more  BMCBI 2007»
13 years 7 months ago
A computational approach for detecting peptidases and their specific inhibitors at the genome level
Background: Peptidases are proteolytic enzymes responsible for fundamental cellular activities in all organisms. Apparently about 2–5% of the genes encode for peptidases, irresp...
Lisa Bartoli, Remo Calabrese, Piero Fariselli, Dam...
FSS
2006
140views more  FSS 2006»
13 years 7 months ago
Advances and challenges in interval-valued fuzzy logic
Among the various extensions to the common [0, 1]-valued truth degrees of "traditional" fuzzy set theory, closed intervals of [0, 1] stand out as a particularly appealin...
Chris Cornelis, Glad Deschrijver, Etienne E. Kerre
IJVR
2008
106views more  IJVR 2008»
13 years 7 months ago
Improved View Frustum Culling Technique for Real-Time Virtual Heritage Application
Real-time virtual heritage application is normally executed with a high performance computer system. This is due to the complexity and highly computational cost which makes such sy...
Mohd Shahrizal Sunar, Abdullah Mohd Zin, Tengku M....
CN
2007
144views more  CN 2007»
13 years 7 months ago
SPP: An anti-phishing single password protocol
Most users have multiple accounts on the Internet where each account is protected by a password. To avoid the headache in remembering and managing a long list of different and un...
Mohamed G. Gouda, Alex X. Liu, Lok M. Leung, Moham...
« Prev « First page 1447 / 1471 Last » Next »