Sciweavers

12193 search results - page 75 / 2439
» It's not all about
Sort
View
ICIP
2001
IEEE
16 years 1 months ago
Adaptive suppression of RFI and its effect on radio-astronomical image formation
Radio-astronomical observations are increasingly contaminated by interference, and suppression techniques become essential. A powerful candidate for interference mitigation is ada...
Amir Leshem, Alle-Jan van der Veen
ICPR
2004
IEEE
16 years 28 days ago
Surface Tortuosity and its Application to Analyzing Cracks in Concrete
Previous studies of tortuosity were restricted to a curve in 2D or 3D. We propose several measures of surface tortuosity based on surface normals and principal curvatures, and app...
George Nagy, Tong Zhang
IEEEARES
2008
IEEE
15 years 6 months ago
A Critique of k-Anonymity and Some of Its Enhancements
k-Anonymity is a privacy property requiring that all combinations of key attributes in a database be repeated at least for k records. It has been shown that k-anonymity alone does...
Josep Domingo-Ferrer, Vicenç Torra
CISC
2007
Springer
133views Cryptology» more  CISC 2007»
15 years 6 months ago
Unlinkable Randomizable Signature and Its Application in Group Signature
We formalize a generic method of constructing efficient group signatures, specifically, we define new notions of unlinkable randomizable signature, indirectly signable signature ...
Sujing Zhou, Dongdai Lin
AAIM
2006
Springer
222views Algorithms» more  AAIM 2006»
15 years 5 months ago
Connected Set Cover Problem and Its Applications
Abstract. We study an extension of the set cover problem, the connected set cover problem, the problem is to find a set cover of minimal size that satisfies some connectivity con...
Tianping Shuai, Xiao-Dong Hu