Sciweavers

2916 search results - page 460 / 584
» Generating Rule Sets from Model Trees
Sort
View
AVBPA
2005
Springer
308views Biometrics» more  AVBPA 2005»
15 years 10 months ago
Biometric Recognition Using Feature Selection and Combination
Most of the prior work in biometric literature has only emphasized on the issue of feature extraction and classification. However, the critical issue of examining the usefulness of...
Ajay Kumar, David Zhang
SPLC
2008
15 years 5 months ago
Filtered Cartesian Flattening: An Approximation Technique for Optimally Selecting Features while Adhering to Resource Constraint
Software Product-lines (SPLs) use modular software components that can be reconfigured into different variants for different requirements sets. Feature modeling is a common method...
Jules White, B. Doughtery, Douglas C. Schmidt
QEST
2009
IEEE
15 years 11 months ago
Recent Extensions to Traviando
—Traviando is a trace analyzer and visualizer for simulation traces of discrete event dynamic systems. In this paper, we briefly outline recent extensions of Traviando towards a...
Peter Kemper
VIS
2003
IEEE
247views Visualization» more  VIS 2003»
16 years 5 months ago
Shape Simplification Based on the Medial Axis Transform
We present a new algorithm for simplifying the shape of 3D objects by manipulating their medial axis transform (MAT). From an unorganized set of boundary points, our algorithm com...
Roger C. Tam, Wolfgang Heidrich
ACNS
2007
Springer
136views Cryptology» more  ACNS 2007»
15 years 10 months ago
Identity-Based Proxy Re-encryption
In a proxy re-encryption scheme a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. A number of solutions have ...
Matthew Green, Giuseppe Ateniese