Sciweavers

1610 search results - page 44 / 322
» Identity Based Multisignatures
Sort
View
106
Voted
PRL
2007
115views more  PRL 2007»
15 years 1 months ago
A decomposition scheme for 3D fuzzy objects based on fuzzy distance information
A decomposition scheme for 3D fuzzy objects is presented. The decomposition is guided by a fuzzy distance transform (FDT) of the fuzzy object and aims to decompose the fuzzy objec...
Stina Svensson
ICMCS
2009
IEEE
151views Multimedia» more  ICMCS 2009»
14 years 11 months ago
Anonymous Biometric Access Control based on homomorphic encryption
In this paper, we consider the problem of incorporating privacy protection in a biometric access control system. An Anonymous Biometric Access Control (ABAC) system is proposed to...
Ying Luo, Sen-Ching S. Cheung, Shuiming Ye
BILDMED
2011
245views Algorithms» more  BILDMED 2011»
14 years 5 months ago
Clustering-Based Detection of Anatomical Features on Organic Shapes
Abstract. Robust and accurate automatic detection of anatomical features on organic shapes is a challenging task. Despite a rough similarity, each shape is unique. To cope with thi...
Konrad Sickel, Vojtech Bubnik
AAAI
2011
14 years 1 months ago
Exploiting Problem Symmetries in State-Based Planners
Previous research in Artificial Intelligence has identified the possibility of simplifying planning problems via the identification and exploitation of symmetries. We advance t...
Nir Pochter, Aviv Zohar, Jeffrey S. Rosenschein
ETS
2011
IEEE
230views Hardware» more  ETS 2011»
14 years 1 months ago
Dynamic Test Set Selection Using Implication-Based On-Chip Diagnosis
—As circuits continue to scale to smaller feature sizes, wearout and latent defects are expected to cause an increasing number of errors in the field. Online error detection tec...
Nuno Alves, Y. Shi, N. Imbriglia, Jennifer Dworak,...