Sciweavers

1375 search results - page 46 / 275
» eg 2006
Sort
View
FDTC
2006
Springer
102views Cryptology» more  FDTC 2006»
13 years 11 months ago
Cryptographic Key Reliable Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults
With physical attacks threatening the security of current cryptographic schemes, no security policy can be developed without taking into account the physical nature of computation....
Alfonso De Gregorio
FOIS
2006
13 years 9 months ago
A theory of granular parthood based on qualitative cardinality and size measures
We present a theory of granular parthood based on qualitative cardinality and size measures. Using standard mereological relations and qualitative, contextdependent relations such ...
Thomas Bittner, Maureen Donnelly
ENVSOFT
2007
157views more  ENVSOFT 2007»
13 years 8 months ago
Assessment of erosion hotspots in a watershed: Integrating the WEPP model and GIS in a case study in the Peruvian Andes
This paper presents a case study in assessment of erosion hotspots in an Andean watershed. To do this, we made use of an interface called Geospatial Modelling of Soil Erosion (GEM...
Guillermo A. Baigorria, Consuelo C. Romero
MMS
2006
13 years 8 months ago
Evaluation and analysis of similarity measures for content-based visual information retrieval
The selection of appropriate proximity measures is one of the crucial success factors of content-based visual information retrieval. In this area of research, proximity measures ar...
Horst Eidenberger
MTA
2006
169views more  MTA 2006»
13 years 8 months ago
MBC-based shape retrieval: basics, optimizations, and open problems
Shape of an object is an important feature for image and multimedia similarity retrievals. In our previous studies we introduced a new boundary-based technique (MBC-based) for shap...
Maytham Safar, Cyrus Shahabi