Sciweavers

1282 search results - page 215 / 257
» Signing on signing off
Sort
View
KES
2008
Springer
13 years 9 months ago
Mammographic Image Contrast Enhancement through the Use of Moving Contrast Sweep
Low contrast in mammographic image has always made detection of subtle signs such as the presence of micro calcification within dense tissue a challenge. Therefore, numerous resear...
Zailani Mohd. Nordin, Nor Ashidi Mat Isa, Umi Kalt...
ENTCS
2007
104views more  ENTCS 2007»
13 years 9 months ago
Exogenous Probabilistic Computation Tree Logic
We define a logic EpCTL for reasoning about the evolution of probabilistic systems. System states correspond to probability distributions over classical states and the system evo...
Pedro Baltazar, Paulo Mateus, Rajagopal Nagarajan,...

Publication
1147views
15 years 7 months ago
PDE-based fast local level set method
We develop a fast method to localize the level set method of Osher and Sethian (1988, Journal of Computational Physics) and address two important issues that are intrinsic to the l...
Danping Peng, Barry Merriman, Stanley Osher, Hongk...
AI
2005
Springer
13 years 9 months ago
Bayesian network modelling through qualitative patterns
In designing a Bayesian network for an actual problem, developers need to bridge the gap between ematical abstractions offered by the Bayesian-network formalism and the features o...
Peter J. F. Lucas
IJNSEC
2007
107views more  IJNSEC 2007»
13 years 9 months ago
Original Signer's Forgery Attacks on Discrete Logarithm Based Proxy Signature Schemes
A proxy signature scheme enables a proxy signer to sign messages on behalf of the original signer. In this paper, we demonstrate that a number of discrete logarithm based proxy si...
Tianjie Cao, Xianping Mao