Sciweavers

Share
ICCSA
2005
Springer
10 years 5 days ago
User-Guided 3D Su-Muk Painting
We present a technique for rendering animated 3D models in a Su-Muk painting style with user’s guide. First, a user can sketch directly over 3D models by varying ink and water va...
Jung Lee, Joon-Yong Ji, Soo-Kyun Kim, Chang-Hun Ki...
ICCSA
2005
Springer
10 years 5 days ago
Mobile Mini-payment Scheme Using SMS-Credit
Mobile Phone has been widely used in the world and adopted in different application areas involved with SMS has been evolved for downloading logo, ring-tones, advertisement, secur...
Simon Fong, Edison Lai
ICCSA
2005
Springer
10 years 8 days ago
Conceptual Modeling of Genetic Studies and Pharmacogenetics
Genetic Studies examine relationships between genetic variation and disease development. Pharmacogenetics studies the responses to drugs against genetic variation. These two lines ...
Xiaohua Zhou, Il-Yeol Song
ICCSA
2005
Springer
10 years 8 days ago
A Penalized Likelihood Estimation on Transcriptional Module-Based Clustering
In this paper, we propose a new clustering procedure for high dimensional microarray data. Major difficulty in cluster analysis of microarray data is that the number of samples to ...
Ryo Yoshida, Seiya Imoto, Tomoyuki Higuchi
ICCSA
2005
Springer
10 years 8 days ago
Realistic Skeleton Driven Skin Deformation
Abstract. Skeleton driven animation is a popular method for the animation of deformable human and creature characters. The main advantage is its computational performance. However ...
X. S. Yang, Jian J. Zhang
ICCSA
2005
Springer
10 years 8 days ago
Perturbed Hidden Matrix Cryptosystems
Abstract. We apply internal perturbation [3] to the matrix-type cryptosystems [Cn] and HM constructed in [9]. Using small instances of these variants, we investigate the existence ...
Zhiping Wu, Jintai Ding, Jason E. Gower, Dingfeng ...
ICCSA
2005
Springer
10 years 8 days ago
Fault Attack on the DVB Common Scrambling Algorithm
Abstract. The Common Scrambling Algorithm (CSA) is used to encrypt streams of video data in the Digital Video Broadcasting (DVB) system. The algorithm uses a combination of a strea...
Kai Wirt
ICCSA
2005
Springer
10 years 8 days ago
Middleware Development for Remote Sensing Data Sharing and Image Processing on HIT-SIP System
Jianqin Wang, Yong Xue, Chaolin Wu, Yanguang Wang,...
ICCSA
2005
Springer
10 years 8 days ago
An Economic Capacity Planning Model Considering Inventory and Capital Time Value
Abstract. A company needs to implement several make-to-stock policies apart from a regular make-to-order production, so that the capacity of expensive resources can be fully utiliz...
S. Michael Wang, Kung-Jeng Wang, Hui-Ming Wee, J. ...
ICCSA
2005
Springer
10 years 8 days ago
Security Flaws in Several Group Signatures Proposed by Popescu
In resent years, Popescu proposed several group signature schemes based on the Okamoto-Shiraishi assumption in [8–11], and claimed his schemes are secure. However, this paper dem...
Guilin Wang, Sihan Qing
books