Sciweavers

5722 search results - page 364 / 1145
» Security Function Interactions
Sort
View
ACSAC
2000
IEEE
15 years 8 months ago
Introducing Decryption Authority into PKI
It is well-known that CA plays the central role in PKI. In this paper we introduce a new component into PKI, DA (decryption authority), which decrypts important and sensitive mess...
Feng Bao
CVPR
2005
IEEE
16 years 5 months ago
Energy Minimization via Graph Cuts: Settling What is Possible
The recent explosion of interest in graph cut methods in computer vision naturally spawns the question: what energy functions can be minimized via graph cuts? This question was fi...
Daniel Freedman, Petros Drineas
123
Voted
TSMC
1998
88views more  TSMC 1998»
15 years 3 months ago
Intelligent compliant motion control
—The role of a compliant motion scheme is to control a robot manipulator in contact with its environment. By accommodating with the interaction force, the manipulator can be used...
Omar M. Al-Jarrah, Yuan F. Zheng
131
Voted
RCIS
2010
15 years 1 months ago
Using Software Metrics in the Evaluation of a Conceptual Component Model
Every interactive system has a functional part and an interactive part. However the software engineering and the human-computer-interaction communities work separately in terms of ...
Eric Ceret, Sophie Dupuy-Chessa, Guillaume Godet-B...
126
Voted
CSB
2005
IEEE
110views Bioinformatics» more  CSB 2005»
15 years 9 months ago
A Topological Measurement for Weighted Protein Interaction Network
High-throughput methods for detecting protein-protein interactions (PPI) have given researchers an initial global picture of protein interactions on a genomic scale. The usefulnes...
Pengjun Pei, Aidong Zhang