Sciweavers

3095 search results - page 606 / 619
» Ubiquitous presence systems
Sort
View
AC
2003
Springer
14 years 7 days ago
Influence of Location over Several Classifiers in 2D and 3D Face Verification
In this paper two methods for human face recognition and the influence of location mistakes are shown. First one, Principal Components Analysis (PCA), has been one of the most appl...
Susana Mata, Cristina Conde, Araceli Sánche...
ASIACRYPT
2003
Springer
14 years 7 days ago
Certificateless Public Key Cryptography
This paper introduces the concept of certificateless public key cryptography (CL-PKC). In contrast to traditional public key cryptographic systems, CL-PKC does not require the use...
Sattam S. Al-Riyami, Kenneth G. Paterson
DBPL
1995
Springer
106views Database» more  DBPL 1995»
14 years 4 days ago
On Impossibility of Decremental Recomputation of Recursive Queries in Relational Calculus and SQL
We study the problem of maintaining recursively-de ned views, such as the transitive closure of a relation, in traditional relational languages that do not have recursion mechanis...
Guozhu Dong, Leonid Libkin, Limsoon Wong
VLDB
1995
ACM
89views Database» more  VLDB 1995»
14 years 3 days ago
OODB Bulk Loading Revisited: The Partitioned-List Approach
Object-oriented and object-relational databases(OODB) need to be able to load the vast quantities of data that OODB users bring to them. Loading OODB datais significantly more com...
Janet L. Wiener, Jeffrey F. Naughton
MFCS
1991
Springer
14 years 3 days ago
CCS Dynamic Bisimulation is Progressing
Weak Observational Congruence (woc) defined on CCS agents is not a bisimulation since it does not require two states reached by bisimilar computations of woc agents to be still w...
Ugo Montanari, Vladimiro Sassone