Sciweavers

11168 search results - page 2020 / 2234
» Abstract State Processes
Sort
View
106
Voted
CAIP
1997
Springer
125views Image Analysis» more  CAIP 1997»
15 years 4 months ago
An Algorithm for Intrinsic Dimensionality Estimation
Abstract. In this paper a new method for analyzing the intrinsic dimensionality (ID) of low dimensional manifolds in high dimensional feature spaces is presented. The basic idea is...
Jörg Bruske, Gerald Sommer
108
Voted
PKC
2000
Springer
120views Cryptology» more  PKC 2000»
15 years 4 months ago
Optimally Efficient Accountable Time-Stamping
Abstract. Efficient secure time-stamping schemes employ a 2-level approach in which the time-stamping service operates in rounds. We say that a time-stamping service is accountable...
Ahto Buldas, Helger Lipmaa, Berry Schoenmakers
RT
2000
Springer
15 years 4 months ago
Walkthroughs with Corrective Texturing
Abstract. We present a new hybrid rendering method for interactive walkthroughs in photometrically complex environments. The display process starts from some approximation of the s...
Marc Stamminger, Jörg Haber, Hartmut Schirmac...
104
Voted
ICANN
1997
Springer
15 years 4 months ago
Topology Representing Networks for Intrinsic Dimensionality Estimation
Abstract. In this paper we compare two methods for intrinsic dimensionality (ID) estimation based on optimally topology preserving maps (OTPMs). The rst one is a direct approach, w...
Jörg Bruske, Gerald Sommer
DOOD
1995
Springer
128views Database» more  DOOD 1995»
15 years 4 months ago
Authorization Analysis of Queries in Object-Oriented Databases
Abstract. A simple model for method-based authorization is defined and an algorithm is presented for testing in compile-time whether a given database schema violates authorization...
Hiroyuki Seki, Yasunori Ishihara, Minoru Ito
« Prev « First page 2020 / 2234 Last » Next »