Sciweavers

719 search results - page 78 / 144
» What HMMs Can Do
Sort
View
SACRYPT
2009
Springer
130views Cryptology» more  SACRYPT 2009»
14 years 2 months ago
Format-Preserving Encryption
Format-preserving encryption (FPE) encrypts a plaintext of some specified format into a ciphertext of identical format—for example, encrypting a valid credit-card number into a ...
Mihir Bellare, Thomas Ristenpart, Phillip Rogaway,...
SIBGRAPI
2007
IEEE
14 years 1 months ago
Seed-Relative Segmentation Robustness of Watershed and Fuzzy Connectedness Approaches
This paper analyzes the robustness issue in three segmentation approaches: the iterative relative fuzzy object extraction, the watershed transforms (WT) by image foresting transfo...
Romaric Audigier, Roberto de Alencar Lotufo
PERVASIVE
2007
Springer
14 years 1 months ago
Operating Appliances with Mobile Phones - Strengths and Limits of a Universal Interaction Device
Abstract. Mobile phones are increasingly becoming ubiquitous computational devices that are almost always available, individually adaptable, and nearly universally connectable (usi...
Christof Roduner, Marc Langheinrich, Christian Flo...
TARK
2007
Springer
14 years 1 months ago
Alternating-time temporal logics with irrevocable strategies
In Alternating-time Temporal Logic (atl), one can express statements about the strategic ability of an agent (or a coalition of agents) to achieve a goal φ such as: “agent i ca...
Thomas Ågotnes, Valentin Goranko, Wojciech J...
ICMCS
2006
IEEE
132views Multimedia» more  ICMCS 2006»
14 years 1 months ago
The Interactive Cooking Support System in Mixed Reality Environment
Recently, many learning systems, such as e-learning and WBT (Web Based Teaching) systems have been developed. In these systems, users can get educational contents and graphical ma...
Arata Horie, Satoru Mega, Kuniaki Uehara