Sciweavers

1028 search results - page 57 / 206
» Reliability Analysis using Graphical Duration Models
Sort
View
155
Voted
CORR
2010
Springer
225views Education» more  CORR 2010»
15 years 2 months ago
Analysis of the Security of BB84 by Model Checking
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was note...
Mohamed Elboukhari, Mostafa Azizi, Abdelmalek Aziz...
ACMICEC
2005
ACM
121views ECommerce» more  ACMICEC 2005»
15 years 8 months ago
A dynamic Bayesian analysis of the drivers of Internet firm survival
We study the impact of a set of industry, firm- and e-commerce-related factors on Internet firm survival. Through the use of one age-based and another calendar time-based Bayesian...
Sudipto Banerjee, Robert J. Kauffman, Bin Wang
142
Voted
ECCV
2002
Springer
16 years 4 months ago
Eye Gaze Correction with Stereovision for Video-Teleconferencing
Abstract. The lack of eye contact in desktop video teleconferencing substantially reduces the effectiveness of video contents. While expensive and bulky hardware is available on th...
Ruigang Yang, Zhengyou Zhang
ICCV
2005
IEEE
16 years 4 months ago
Probabilistic Contour Extraction Using Hierarchical Shape Representation
In this paper, we address the issue of extracting contour of the object with a specific shape. A hierarchical graphical model is proposed to represent shape variations. A complex ...
Xin Fan, Chun Qi, Dequn Liang, Hua Huang
157
Voted
SPRINGSIM
2010
15 years 28 days ago
GTNA: a framework for the graph-theoretic network analysis
Concise and reliable graph-theoretic analysis of complex networks today is a cumbersome task, consisting essentially of the adaptation of intricate libraries for each specific pr...
Benjamin Schiller, Dirk Bradler, Immanuel Schweize...