Sciweavers

3092 search results - page 442 / 619
» Where are you pointing
Sort
View
ICISC
2003
89views Cryptology» more  ICISC 2003»
13 years 11 months ago
Security Analysis of Some Proxy Signatures
Abstract. A proxy signature scheme allows an entity to delegate his/her signing capability to another entity in such a way that the latter can sign messages on behalf of the former...
Guilin Wang, Feng Bao, Jianying Zhou, Robert H. De...
IJCAI
2003
13 years 11 months ago
Continuous nonlinear dimensionality reduction by kernel Eigenmaps
We equate nonlinear dimensionality reduction (NLDR) to graph embedding with side information about the vertices, and derive a solution to either problem in the form of a kernel-ba...
Matthew Brand
IJCAI
2003
13 years 11 months ago
Incremental Tractable Reasoning about Qualitative Temporal Constraints
In many applications of temporal reasoning we are in­ terested in reasoning incrementally In particular, given a CSP of temporal constrains and a new constraint, we want to maint...
Alfonso Gerevini
SPLC
2004
13 years 11 months ago
Generalized Release Planning for Product Line Architectures
This paper elaborates on the coordination and management of evolving software product-lines, where development teams work around a shared and reusable domain infrastructure. The tr...
Louis J. M. Taborda
WSCG
2004
144views more  WSCG 2004»
13 years 11 months ago
Free Form Modelling by Curve Features Manipulation
Freeform features (FFF) manipulation is an emerging research area in geometric modelling field, which aims to develop innovative shape modification paradigms, more focused on glob...
Giancarlo Amati, Alfredo Liverani, Gianni Caligian...