Sciweavers

5630 search results - page 129 / 1126
» Computability in Specification
Sort
View
ICHIM
2001
65views more  ICHIM 2001»
15 years 5 months ago
Dating and Authentication of Rembrandt's Etchings with the Help of Computational Intelligence
In this paper it is studied how the analysis of the structure of the paper of Rembrandt's etchings can help determining the authenticity of the etchings and the dates of the ...
Jan C. A. van der Lubbe, Eugene P. van Someren, Ma...
TC
2008
15 years 4 months ago
On the Computational Security of a Distributed Key Distribution Scheme
In a distributed key distribution scheme, a set of servers help a set of users in a group to securely obtain a common key. Security means that an adversary who corrupts some server...
Vanesa Daza, Javier Herranz, Germán S&aacut...
JMIV
2000
143views more  JMIV 2000»
15 years 4 months ago
A Linear Algorithm for Computing the Homography from Conics in Correspondence
Abstract. This paper presents a study, based on conic correspondences, on the relationship between two perspective images acquired by an uncalibrated camera. We show that for a pai...
Akihiro Sugimoto
TVCG
2012
200views Hardware» more  TVCG 2012»
13 years 6 months ago
Attention and Visual Memory in Visualization and Computer Graphics
—A fundamental goal of visualization is to produce images of data that support visual analysis, exploration, and discovery of novel insights. An important consideration during vi...
Christopher G. Healey, James T. Enns
ICDE
2005
IEEE
106views Database» more  ICDE 2005»
16 years 5 months ago
Effective Computation of Biased Quantiles over Data Streams
Skewis prevalentin manydata sourcessuchas IP traffic streams. To continually summarize the distribution of such data, a highbiased set of quantiles (e.g., 50th, 90th and 99th perc...
Graham Cormode, Flip Korn, S. Muthukrishnan, Dives...