Sciweavers

796 search results - page 67 / 160
» Spoofing prevention method
Sort
View
SODA
2008
ACM
75views Algorithms» more  SODA 2008»
13 years 11 months ago
Strongly polynomial and fully combinatorial algorithms for bisubmodular function minimization
Bisubmodular functions are a natural "directed", or "signed", extension of submodular functions with several applications. Recently Fujishige and Iwata showed ...
S. Thomas McCormick, Satoru Fujishige
WALTD
2008
109views Education» more  WALTD 2008»
13 years 11 months ago
Inclusive, Adaptive Design for Students with Severe Learning Disabilities
Young adults with severe disabilities and learning difficulties (SLD) have very limited access to appropriate learning resources. Their unique individual needs and requirements pr...
Matt Harrison, Claire Stockton
EACL
2006
ACL Anthology
13 years 11 months ago
Unsupervised Discovery of Persian Morphemes
This paper reports the present results of a research on unsupervised Persian morpheme discovery. In this paper we present a method for discovering the morphemes of Persian languag...
Mohsen Arabsorkhi, Mehrnoush Shamsfard
WSCG
2001
92views more  WSCG 2001»
13 years 11 months ago
Enhancements to Directional Coherence Maps
Directional Coherence Maps as proposed by Guo in '98 are a very efficient acceleration technique for ray tracing based global illumination renderers. It vastly reduces the nu...
Annette Scheel, Marc Stamminger, Jörg Pü...
WSCG
2004
115views more  WSCG 2004»
13 years 11 months ago
A Public-key Asymmetric Robust Watermarking Algorithm Based on Signal with Special Correlation Characteristic
A public-key asymmetric robust watermarking algorithm based on signal with special correlation characteristic is proposed in this paper. This algorithm is designed to permit pubic...
Yanjun Hu, Li Gao, Xiaoping Ma, Zhigeng Pan, Li Li