Sciweavers

1897 search results - page 318 / 380
» Mining Chains of Relations
Sort
View
JOC
2007
133views more  JOC 2007»
14 years 9 months ago
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication
In the security chain the weakest link is definitely the human one: human beings cannot remember long secrets and often resort to rather insecure solutions to keep track of their ...
Dario Catalano, David Pointcheval, Thomas Pornin
CAD
2000
Springer
14 years 9 months ago
The Enterprise-Web portal for life-cycle support
As we enter the new millennium, the approach to product development is evolving rapidly. Companies are in the process of creating a distributed design and manufacturing environmen...
Mohsen Rezayat
BC
1998
118views more  BC 1998»
14 years 9 months ago
A cross-interval spike train analysis: the correlation between spike generation and temporal integration of doublets
Abstract. A stochastic spike train analysis technique is introduced to reveal the correlation between the firing of the next spike and the temporal integration period of two conse...
David C. Tam
NECO
2007
129views more  NECO 2007»
14 years 9 months ago
Variational Bayes Solution of Linear Neural Networks and Its Generalization Performance
It is well-known that, in unidentifiable models, the Bayes estimation provides much better generalization performance than the maximum likelihood (ML) estimation. However, its ac...
Shinichi Nakajima, Sumio Watanabe
PR
2007
109views more  PR 2007»
14 years 9 months ago
Unsupervised multiscale oil slick segmentation from SAR images using a vector HMC model
This study focuses on the segmentation and characterization of oil slicks on the sea surface from synthetic aperture radar (SAR) observations. In fact, an increase in viscosity du...
Stéphane Derrode, Grégoire Mercier