Sciweavers

790 search results - page 113 / 158
» Subexponential Parameterized Algorithms
Sort
View
107
Voted
ICMCS
2005
IEEE
116views Multimedia» more  ICMCS 2005»
15 years 8 months ago
Distance-Level Fusion Strategies for Online Signature Verification
In this paper an approach for combining online signature authentication experts will be proposed. The different experts are based on one feature extraction method presented in our...
Tobias Scheidat, Claus Vielhauer, Jana Dittmann
120
Voted
CVBIA
2005
Springer
15 years 8 months ago
3D Statistical Shape Models to Embed Spatial Relationship Information
Abstract. This paper presents the creation of 3D statistical shape models of the knee bones and their use to embed information into a segmentation system for MRIs of the knee. We p...
Jurgen Fripp, Pierrick Bourgeat, Andrea J. U. Mewe...
113
Voted
MFCS
2005
Springer
15 years 8 months ago
Nondeterministic Graph Searching: From Pathwidth to Treewidth
Abstract. We introduce nondeterministic graph searching with a controlled amount of nondeterminism and show how this new tool can be used in algorithm design and combinatorial anal...
Fedor V. Fomin, Pierre Fraigniaud, Nicolas Nisse
115
Voted
IMR
2004
Springer
15 years 8 months ago
Surface Mesh Projection for Hexahedral Mesh Generation by Sweeping
Sweep method is one of the most robust techniques to generate hexahedral meshes in extrusion volumes. One of the main issues to be dealt by any sweep algorithm is the projection o...
Xevi Roca, Josep Sarrate, Antonio Huerta
CCS
2007
ACM
15 years 6 months ago
Efficient policy analysis for administrative role based access control
Administrative RBAC (ARBAC) policies specify how Role-Based Access Control (RBAC) policies may be changed by each administrator. It is often difficult to fully understand the effe...
Scott D. Stoller, Ping Yang, C. R. Ramakrishnan, M...