Sciweavers

16404 search results - page 3126 / 3281
» A set coverage problem
Sort
View
175
Voted
ICANNGA
2007
Springer
191views Algorithms» more  ICANNGA 2007»
15 years 10 months ago
Novel Multi-layer Non-negative Tensor Factorization with Sparsity Constraints
In this paper we present a new method of 3D non-negative tensor factorization (NTF) that is robust in the presence of noise and has many potential applications, including multi-way...
Andrzej Cichocki, Rafal Zdunek, Seungjin Choi, Rob...
140
Voted
ICB
2007
Springer
156views Biometrics» more  ICB 2007»
15 years 10 months ago
Robust Extraction of Secret Bits from Minutiae
Abstract. Our goal is to extract consistent bits from the same fingerprint in a noisy environment. Such bits can then be used as a secret key in several cryptographic applications...
Ee-Chien Chang, Sujoy Roy
ICFEM
2007
Springer
15 years 10 months ago
Model Checking with SAT-Based Characterization of ACTL Formulas
Bounded semantics of LTL with existential interpretation and that of ECTL (the existential fragment of CTL), and the characterization of these existentially interpreted properties ...
Wenhui Zhang
148
Voted
ICWE
2007
Springer
15 years 10 months ago
Metamodeling the Quality of the Web Development Process' Intermediate Artifacts
WE practices lack an impact on industry, partly due to a WE field that is not quality-aware. In fact, it is difficult to find WE methodologies that pay explicit attention to qualit...
Cristina Cachero, Coral Calero, Geert Poels
124
Voted
IWSEC
2007
Springer
15 years 10 months ago
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol
At Indocrypt 2005, Viet et al., [22] have proposed an anonymous password-authenticated key exchange (PAKE) protocol and its threshold construction both of which are designed for cl...
SeongHan Shin, Kazukuni Kobara, Hideki Imai
« Prev « First page 3126 / 3281 Last » Next »