Sciweavers

384 search results - page 14 / 77
» A Vector Approach to Cryptography Implementation
Sort
View
IMAMS
2007
180views Mathematics» more  IMAMS 2007»
15 years 1 months ago
Implicit Boundary Control of Vector Field Based Shape Deformations
We present a shape deformation approach which preserves volume, prevents self-intersections and allows for exact control of the deformation impact. The volume preservation and prev...
Wolfram von Funck, Holger Theisel, Hans-Peter Seid...
COLT
2003
Springer
15 years 5 months ago
Learning with Rigorous Support Vector Machines
We examine the so-called rigorous support vector machine (RSVM) approach proposed by Vapnik (1998). The formulation of RSVM is derived by explicitly implementing the structural ris...
Jinbo Bi, Vladimir Vapnik
ICB
2009
Springer
141views Biometrics» more  ICB 2009»
15 years 6 months ago
Towards Structured Approaches to Arbitrary Data Selection and Performance Prediction for Speaker Recognition
We developed measures relating feature vector distributions to speaker recognition (SR) performances for performance prediction and potential arbitrary data selection for SR. We ex...
Howard Lei
ICCSA
2011
Springer
14 years 3 months ago
View- and Scale-Based Progressive Transmission of Vector Data
Progressive transmission represents an effective means for the transmission of spatial data over the web. We classify current implementations of this paradigm as either view- or s...
Padraig Corcoran, Peter Mooney, Michela Bertolotto...
ICDAR
2007
IEEE
15 years 6 months ago
Skeletonization by Gradient Regularization and Diffusion
This paper describes a skeletonization process for grayscale or color images based on the diffusion of the color gradient vectors by using a simple iterative regularization scheme...
Frank Lebourgeois, Hubert Emptoz