Sciweavers

13436 search results - page 2594 / 2688
» e
Sort
View
DAM
2007
177views more  DAM 2007»
15 years 1 months ago
On Khachiyan's algorithm for the computation of minimum-volume enclosing ellipsoids
Given A := {a1, . . . , am} ⊂ Rd whose affine hull is Rd, we study the problems of computing an approximate rounding of the convex hull of A and an approximation to the minimum ...
Michael J. Todd, E. Alper Yildirim
JSS
2008
93views more  JSS 2008»
15 years 1 months ago
A language for high-level description of adaptive web systems
This paper focuses on the proposal, design, and implementation of AWL, the Adaptive Web Language. Also, an example application named PENS is explained and implemented in AWL. AWL ...
S. Hossein Sadat-Mohtasham, Ali A. Ghorbani
JUCS
2008
156views more  JUCS 2008»
15 years 1 months ago
Efficient k-out-of-n Oblivious Transfer Schemes
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme a...
Cheng-Kang Chu, Wen-Guey Tzeng
DPD
2007
86views more  DPD 2007»
15 years 1 months ago
Semantics based customization of UBL document schemas
Abstract. Universal Business Language (UBL) is an OASIS initiative to develop common business document schemas to provide document interoperability in the eBusiness domain. Since t...
Yalin Yarimagan, Asuman Dogac
JEI
2006
246views more  JEI 2006»
15 years 1 months ago
Fuzzy logic recursive motion detection and denoising of video sequences
We propose a fuzzy logic recursive scheme for motion detection and spatiotemporal filtering that can deal with the Gaussian noise and unsteady illumination conditions in both the t...
Vladimir Zlokolica, Aleksandra Pizurica, Wilfried ...
« Prev « First page 2594 / 2688 Last » Next »