Sciweavers

1361 search results - page 266 / 273
» Skeletonization of Digital Objects
Sort
View
JOC
2007
133views more  JOC 2007»
14 years 9 months ago
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication
In the security chain the weakest link is definitely the human one: human beings cannot remember long secrets and often resort to rather insecure solutions to keep track of their ...
Dario Catalano, David Pointcheval, Thomas Pornin
AAMAS
2004
Springer
14 years 9 months ago
A Manifesto for Agent Technology: Towards Next Generation Computing
The European Commission's eEurope initiative aims to bring every citizen, home, school, business and administration online to create a digitally literate Europe. The value lie...
Michael Luck, Peter McBurney, Chris Preist
98
Voted
CGA
2004
14 years 9 months ago
Hyperscore: A Graphical Sketchpad for Novice Composers
graphical abstractions, Hyperscore provides a visual analogue for what is happening structurally in the music as opposed to displaying musical events in procedural notation or as a...
Morwaread M. Farbood, Egon C. Pasztor, Kevin Jenni...
GEOINFORMATICA
1998
125views more  GEOINFORMATICA 1998»
14 years 9 months ago
Computational Perspectives on Map Generalization
ally related entity types, or classes, into higher level, more abstract types, as part of a hierarchical classi®cation scheme. graphy, generalization retains the notion of abstrac...
Robert Weibel, Christopher B. Jones
EC
2008
174views ECommerce» more  EC 2008»
14 years 9 months ago
Automated Design of Image Operators that Detect Interest Points
This work describes how evolutionary computation can be used to synthesize lowlevel image operators that detect interesting points on digital images. Interest point detection is a...
Leonardo Trujillo, Gustavo Olague