Sciweavers

1242 search results - page 145 / 249
» Digital Objects as Passwords
Sort
View
ICASSP
2010
IEEE
14 years 10 months ago
Multiplicative update rules for nonnegative matrix factorization with co-occurrence constraints
Nonnegative matrix factorization (NMF) is a widely-used tool for obtaining low-rank approximations of nonnegative data such as digital images, audio signals, textual data, financ...
Steven K. Tjoa, K. J. Ray Liu
CGF
2010
115views more  CGF 2010»
14 years 10 months ago
Closed-form Blending of Local Symmetries
We present a closed-form solution for the symmetrization problem, solving for the optimal deformation that reconciles a set of local bilateral symmetries. Given as input a set of ...
Deboshmita Ghosh, Nina Amenta, Michael M. Kazhdan
CORR
2010
Springer
58views Education» more  CORR 2010»
14 years 10 months ago
Verifying Recursive Active Documents with Positive Data Tree Rewriting
This paper considers a tree-rewriting framework for modeling documents evolving through service calls. We focus on the automatic verification of properties of documents that may c...
Blaise Genest, Anca Muscholl, Zhilin Wu
IJNSEC
2008
108views more  IJNSEC 2008»
14 years 10 months ago
Multiplicative Forward-Secure Threshold Signature Scheme
The devastating consequence of secret key exposure in digital signature is that any signature can be forged and cannot be trusted. To mitigate the damage of secret key exposure, f...
Sherman S. M. Chow, H. W. Go, Lucas Chi Kwong Hui,...
CG
2007
Springer
14 years 10 months ago
Density estimation for dynamic volumes
We propose a new approach to capture the volumetric density of dynamic scattering media instantaneously with a single image. The volume is probed with a set of laser lines and the...
Christian Fuchs, Tongbo Chen, Michael Goesele, Hol...