Sciweavers

17450 search results - page 198 / 3490
» Numerical Methods with Applications
Sort
View
125
Voted
IJNSEC
2006
94views more  IJNSEC 2006»
15 years 3 months ago
A Binary Redundant Scalar Point Multiplication in Secure Elliptic Curve Cryptosystems
The main back-bone operation in elliptic curve cryptosystems is scalar point multiplication. The most frequently used method implementing the scalar point multiplication which is ...
Sangook Moon
176
Voted
PAMI
2011
14 years 10 months ago
Topology-Adaptive Mesh Deformation for Surface Evolution, Morphing, and Multiview Reconstruction
—Triangulated meshes have become ubiquitous discrete surface representations. In this paper, we address the problem of how to maintain the manifold properties of a surface while ...
Andrei Zaharescu, Edmond Boyer, Radu Horaud
ICPR
2008
IEEE
15 years 10 months ago
Remote multimodal biometric authentication using bit priority-based fragile watermarking
We propose a new remote multimodal biometric authentication framework based on fragile watermarking for transferring multi-biometrics over networks to server for authentication. A...
Tuan Hoang, Dat Tran, Dharmendra Sharma
IJCAI
1997
15 years 4 months ago
Law Discovery using Neural Networks
This paper proposes a new connectionist approach to numeric law discovery; i.e., neural networks (law-candidates) are trained by using a newly invented second-order learning algor...
Kazumi Saito, Ryohei Nakano
134
Voted
IJCM
2010
108views more  IJCM 2010»
15 years 2 months ago
Lifting solutions of quasilinear convection-dominated problems
The steady state of the quasilinear convection-diffusion-reaction equation ut − (D(u) u) + b(u) u + c(u) = 0 (1) is studied. Depending on the ratio between convection and diff...
J. A. Ferreira, A. P. Mouro, P. Oliveira