Sciweavers

632 search results - page 60 / 127
» Two Facets of Authentication
Sort
View
KDD
2007
ACM
144views Data Mining» more  KDD 2007»
14 years 9 months ago
Fast direction-aware proximity for graph mining
In this paper we study asymmetric proximity measures on directed graphs, which quantify the relationships between two nodes or two groups of nodes. The measures are useful in seve...
Hanghang Tong, Christos Faloutsos, Yehuda Koren
CBSE
2005
Springer
14 years 2 months ago
Finding a Needle in the Haystack: A Technique for Ranking Matches Between Components
Abstract. Searching and subsequently selecting reusable components from component repositories has become a key impediment for not only component-based development but also for ach...
Naiyana Tansalarak, Kajal T. Claypool
HICSS
2003
IEEE
88views Biometrics» more  HICSS 2003»
14 years 2 months ago
Internet Use, Transparency, and Interactivity Effects on Trust in Government
This paper asks how internet use, citizen satisfaction with e-government and citizen trust in government are interrelated. Prior research has found that agencies stress informatio...
Eric W. Welch, Charles C. Hinnant
COMPGEOM
2007
ACM
14 years 25 days ago
On the hardness of minkowski addition and related operations
For polytopes P, Q Rd we consider the intersection P Q; the convex hull of the union CH(P Q); and the Minkowski sum P + Q. We prove that given rational H-polytopes P1, P2, Q it...
Hans Raj Tiwary
ISVD
2010
IEEE
13 years 7 months ago
Guaranteed Quality Tetrahedral Delaunay Meshing for Medical Images
—In this paper, we present a Delaunay refinement algorithm for meshing 3D medical images. We prove that (a) all the tetrahedra of the output mesh have radius-edge ratio less tha...
Panagiotis A. Foteinos, Andrey N. Chernikov, Nikos...