Sciweavers

1050 search results - page 33 / 210
» Two methods of authenticated positioning
Sort
View
ACSW
2006
15 years 1 months ago
Formal analysis of card-based payment systems in mobile devices
To provide card holder authentication while they are conducting an electronic transaction using mobile devices, VISA and MasterCard independently proposed two electronic payment p...
Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Hu...
VIS
2004
IEEE
126views Visualization» more  VIS 2004»
16 years 29 days ago
Physically Based Methods for Tensor Field Visualization
The physical interpretation of mathematical features of tensor fields is highly application-specific. Existing visualization methods for tensor fields only cover a fraction of the...
Bernd Hamann, Boris Jeremic, Hans Hagen, Ingrid Ho...
COMCOM
2007
136views more  COMCOM 2007»
14 years 11 months ago
A Delaunay Triangulation based method for wireless sensor network deployment
To obtain a satisfied performance of wireless sensor network, an adaptable sensor deployment method for various applications is essential. In this paper, we propose a centralized ...
Chun-Hsien Wu, Kuo-Chuan Lee, Yeh-Ching Chung
CORR
2010
Springer
159views Education» more  CORR 2010»
14 years 12 months ago
An Elimination Method for Solving Bivariate Polynomial Systems: Eliminating the Usual Drawbacks
We present an exact and complete algorithm to isolate the real solutions of a zero-dimensional bivariate polynomial system. The proposed algorithm constitutes an elimination metho...
Eric Berberich, Pavel Emeliyanenko, Michael Sagral...
ALMOB
2008
127views more  ALMOB 2008»
14 years 12 months ago
HuMiTar: A sequence-based method for prediction of human microRNA targets
Background: MicroRNAs (miRs) are small noncoding RNAs that bind to complementary/partially complementary sites in the 3' untranslated regions of target genes to regulate prot...
Jishou Ruan, Hanzhe Chen, Lukasz A. Kurgan, Ke Che...