Sciweavers

3233 search results - page 644 / 647
» Validation Method for Intelligent Systems
Sort
View
CISC
2005
Springer
109views Cryptology» more  CISC 2005»
14 years 26 days ago
Enforcing Email Addresses Privacy Using Tokens
We propose a system which allows users to monitor how their email addresses are used and how they spread over the Internet. This protects the privacy of the user and can reduce the...
Roman Schlegel, Serge Vaudenay
ECWEB
2005
Springer
121views ECommerce» more  ECWEB 2005»
14 years 26 days ago
Fuzzy Virtual Card Agent for Customizing Divisible Card Payments
: E-commerce customers may have a problem when paying for the purchase of a major item, if its price is larger than the available credit on their credit card. In the brick and mort...
Soon Ae Chun, Yoo Jung An, James Geller, Sunju Par...
PREMI
2005
Springer
14 years 25 days ago
Computational Molecular Biology of Genome Expression and Regulation
Abstract. Technological advances in experimental and computational molecular biology have revolutionized the whole fields of biology and medicine. Large-scale sequencing, expressio...
Michael Q. Zhang
ATAL
2003
Springer
14 years 17 days ago
MONAD: a flexible architecture for multi-agent control
Research in multi-agent systems has led to the development of many multi-agent control architectures. However, we believe that there is currently no known optimal structure for mu...
Thuc Vu, Jared Go, Gal A. Kaminka, Manuela M. Velo...
SIGGRAPH
1996
ACM
13 years 11 months ago
Modeling and Rendering Architecture from Photographs: A Hybrid Geometry- and Image-Based Approach
We present a new approach for modeling and rendering existing architectural scenes from a sparse set of still photographs. Our modeling approach, which combines both geometry-base...
Paul E. Debevec, Camillo J. Taylor, Jitendra Malik