Sciweavers

544 search results - page 85 / 109
» What cannot be computed locally!
Sort
View
CORR
2007
Springer
127views Education» more  CORR 2007»
13 years 8 months ago
Using decision problems in public key cryptography
There are several public key establishment protocols as well as complete public key cryptosystems based on allegedly hard problems from combinatorial (semi)group theory known by no...
Vladimir Shpilrain, Gabriel Zapata
KI
2010
Springer
13 years 7 months ago
CoTeSys - Cognition for Technical Systems
The COTESYS cluster of excellence1 investigates cognition for technical systems such as vehicles, robots, and factories. Cognitive technical systems (CTS) are information processi...
Martin Buss, Michael Beetz
BIRTHDAY
2009
Springer
13 years 6 months ago
Some Notes on Models and Modelling
Analytical models are a fundamental tool in the development of computer-based systems of every kind: their essential purpose is to support human understanding and reasoning in deve...
Michael Jackson
CVPR
2011
IEEE
13 years 5 months ago
Natural Image Denoising: Optimality and Inherent Bounds
The goal of natural image denoising is to estimate a clean version of a given noisy image, utilizing prior knowledge on the statistics of natural images. The problem has been stud...
Anat Levin, Boaz Nadler
BMCBI
2011
13 years 3 months ago
A quality metric for homology modeling: the H-factor
Background: The analysis of protein structures provides fundamental insight into most biochemical functions and consequently into the cause and possible treatment of diseases. As ...
Eric di Luccio, Patrice Koehl