Sciweavers

1282 search results - page 110 / 257
» Signing on signing off
Sort
View
COMPGEOM
1997
ACM
14 years 1 months ago
Computing Exact Geometric Predicates Using Modular Arithmetic with Single Precision
Abstract: We propose an e cient method that determines the sign of a multivariate polynomial expression with integer coe cients. This is a central operation on which the robustness...
Hervé Brönnimann, Ioannis Z. Emiris, V...
FGR
1996
IEEE
186views Biometrics» more  FGR 1996»
14 years 1 months ago
Dynamical system representation, generation, and recognition of basic oscillatory motion gestures
We present a system for generation and recognition of oscillatory gestures. Inspired by gestures used in two representative human-tohuman control areas, we consider a set of oscil...
Charles J. Cohen, Lynn Conway, Daniel E. Koditsche...
ACSAC
2004
IEEE
14 years 1 months ago
Securing Java RMI-Based Distributed Applications
Both Java RMI and Jini use a proxy-based architecture. In this architecture, a client interacts with a service through a proxy, which is code downloaded from a directory and insta...
Ninghui Li, John C. Mitchell, Derrick Tong
AUSDM
2006
Springer
202views Data Mining» more  AUSDM 2006»
14 years 1 months ago
A Comparative Study of Classification Methods For Microarray Data Analysis
In response to the rapid development of DNA Microarray technology, many classification methods have been used for Microarray classification. SVMs, decision trees, Bagging, Boostin...
Hong Hu, Jiuyong Li, Ashley W. Plank, Hua Wang, Gr...
CSREASAM
2006
13 years 10 months ago
Mechanism-Based PKI - A Real-Time Key Generation from Fingerprints
- This paper proposes a "mechanism-based PKI", in which only a mechanism for generating user's private keys is installed on a smart card. The private key is generate...
Yoichi Shibata, Masahiro Mimura, Kenta Takahashi, ...