Sciweavers

3740 search results - page 386 / 748
» A Fast Skeletonization Method
Sort
View
IJNSEC
2006
113views more  IJNSEC 2006»
15 years 3 months ago
An Identity-based Mediated Signature Scheme from Bilinear Pairing
It has always been a critical issue to find efficient methods for fast revocation of a user's identity in identity (ID)based cryptosystems. Unfortunately, none of the previou...
Xiangguo Cheng, Lifeng Guo, Xinmei Wang
JMLR
2006
125views more  JMLR 2006»
15 years 3 months ago
Spam Filtering Using Statistical Data Compression Models
Spam filtering poses a special problem in text categorization, of which the defining characteristic is that filters face an active adversary, which constantly attempts to evade fi...
Andrej Bratko, Gordon V. Cormack, Bogdan Filipic, ...
TIFS
2008
109views more  TIFS 2008»
15 years 3 months ago
Lookup-Table-Based Secure Client-Side Embedding for Spread-Spectrum Watermarks
Today, mass-scale electronic content distribution systems embed forensic tracking watermarks primarily at the distribution server. For limiting the bandwidth usage and server compl...
Mehmet Utku Celik, Aweke N. Lemma, Stefan Katzenbe...
COMGEO
2004
ACM
15 years 3 months ago
A multi-dimensional approach to force-directed layouts of large graphs
We present a novel hierarchical force-directed method for drawing large graphs. Given a graph G = (V,E), the algorithm produces an embedding for G in an Euclidean space E of any d...
Pawel Gajer, Michael T. Goodrich, Stephen G. Kobou...
122
Voted
AROBOTS
2000
137views more  AROBOTS 2000»
15 years 3 months ago
Acquiring Mobile Robot Behaviors by Learning Trajectory Velocities
Abstract. The development of robots that learn from experience is a relentless challenge confronting artificial intelligence today. This paper describes a robot learning method whi...
Koren Ward, Alexander Zelinsky