Sciweavers

24529 search results - page 4489 / 4906
» Computing on Authenticated Data
Sort
View
COLING
2000
15 years 6 months ago
Jurilinguistic Engineering in Cantonese Chinese: An N-gram-based Speech to Text Transcription System
A Cantonese Chinese transcription system to automatically convert stenograph code to Chinese characters ix reported. The major challenge in developing such a system is the critica...
Benjamin K. Tsou, K. K. Sin, Samuel W. K. Chan, To...
VMV
2003
165views Visualization» more  VMV 2003»
15 years 6 months ago
C1-Continuous Terrain Reconstruction from Sparse Contours
Contour lines from topographic maps are still the most common form of elevation data for the Earth’s surface and in the case of historical landscapes, they often are the only av...
Kai Hormann, Salvatore Spinello, Peter Schröd...
DOA
2000
87views more  DOA 2000»
15 years 6 months ago
MODE: A Java-like Environment for Experimenting Mobility Policies
The wide acceptance of object-oriented environments and proposals has renewed interest in all the class inheritance related issues; in particular its implementation in distributed...
Giuliano Armano, Antonio Corradi, Letizia Leonardi...
ICISC
1998
132views Cryptology» more  ICISC 1998»
15 years 6 months ago
The flood-gate principle - a hybrid approach to a high security solution
The classical role of a firewall consists in protecting a computer network against attacks from the outside world, especially the Internet. Firewalls are often expensive, hard to c...
Ernst Georg Haffner, Thomas Engel, Christoph Meine...
WSCG
2003
185views more  WSCG 2003»
15 years 6 months ago
Complex 3D Feature Registration Using a Marching Template
The registration of 3D form features is essential to the supporting of reverse shape design processes. Extracting an editable shape feature from unordered data points is notorious...
Joris S. M. Vergeest, Sander Spanjaard, Chensheng ...
« Prev « First page 4489 / 4906 Last » Next »