Sciweavers

1515 search results - page 285 / 303
» Information Integration: Conceptual Modeling and Reasoning S...
Sort
View
ECCV
1998
Springer
15 years 11 months ago
Shape Representations from Shading Primitives
Diffuse interreflections mean that surface shading and shape are related in ways that are difficult to untangle; in particular, distant and invisible surfaces may affect the shadi...
John A. Haddon, David A. Forsyth
86
Voted
NAR
2006
177views more  NAR 2006»
14 years 9 months ago
PUMA2 - grid-based high-throughput analysis of genomes and metabolic pathways
The PUMA2 system (available at http://compbio.mcs. 10 anl.gov/puma2) is an interactive, integrated bioinformatics environment for high-throughput genetic sequence analysis and met...
Natalia Maltsev, Elizabeth M. Glass, Dinanath Sula...
118
Voted
CISC
2005
Springer
169views Cryptology» more  CISC 2005»
15 years 3 months ago
On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography
Abstract. Despite many good (secure) key agreement protocols based on publickey cryptography exist, secure associations between two wireless devices are often established using sym...
Serge Vaudenay
CRYPTO
2012
Springer
223views Cryptology» more  CRYPTO 2012»
13 years 3 days ago
Collusion-Preserving Computation
In collusion-free protocols, subliminal communication is impossible and parties are thus unable to communicate “any information beyond what the protocol allows”. Collusion-fre...
Joël Alwen, Jonathan Katz, Ueli Maurer, Vassi...
76
Voted
SEMWEB
2009
Springer
15 years 4 months ago
Probabilistic Ontology and Knowledge Fusion for Procurement Fraud Detection in Brazil
To cope with society’s demand for transparency and corruption prevention, the Brazilian Office of the Comptroller General (CGU) has carried out a number of actions, including: aw...
Rommel N. Carvalho, Kathryn B. Laskey, Paulo Cesar...