Sciweavers

688 search results - page 104 / 138
» Comparison of Conceptual Graphs
Sort
View
ICPR
2008
IEEE
15 years 4 months ago
Online personal identification in night using multiple face representations
This paper details a fully automated face authentication system using low-cost near infrared imaging. The image normalization step consists of eye center localization, scale corre...
Ajay Kumar, T. Srikanth
59
Voted
IEEESCC
2008
IEEE
15 years 4 months ago
End-to-End Versioning Support for Web Services
Software services are, just like any other software system, subject to permanent change. We argue that these changes should generally be transparent to service consumers. However,...
Philipp Leitner, Anton Michlmayr, Florian Rosenber...
CIBCB
2007
IEEE
15 years 4 months ago
Evolving Extremal Epidemic Networks
The susceptible, infected, removed model for epidemics assumes that the population in which the epidemic takes place is well mixed. This strong assumption can be relaxed by permit...
Dan Ashlock, Fatemeh Jafargholi
78
Voted
ISSAC
2007
Springer
146views Mathematics» more  ISSAC 2007»
15 years 3 months ago
Fast and exact geometric analysis of real algebraic plane curves
An algorithm is presented for the geometric analysis of an algebraic curve f(x, y) = 0 in the real affine plane. It computes a cylindrical algebraic decomposition (CAD) of the pla...
Arno Eigenwillig, Michael Kerber, Nicola Wolpert
PET
2007
Springer
15 years 3 months ago
Anonymity in the Wild: Mixes on Unstructured Networks
Abstract. As decentralized computing scenarios get ever more popular, unstructured topologies are natural candidates to consider running mix networks upon. We consider mix network ...
Shishir Nagaraja