Sciweavers

1734 search results - page 26 / 347
» its 2000
Sort
View
INFORMATICALT
2000
159views more  INFORMATICALT 2000»
14 years 9 months ago
The Calculation of Electrotonic Potential Half-Time and its Derivative in Respect to Distance in One- and Two-Dimensional RC Med
In this work the analytical expressions of half-time T1/2 and its derivatives in respect to distance T1/2/R in a one-dimensional RC medium (a current electrode has a shape of the s...
Romualdas Veteikis
PKC
2005
Springer
144views Cryptology» more  PKC 2005»
15 years 3 months ago
RSA with Balanced Short Exponents and Its Application to Entity Authentication
In typical RSA, it is impossible to create a key pair (e, d) such that both are simultaneously much shorter than φ(N). This is because if d is selected first, then e will be of t...
Hung-Min Sun, Cheng-Ta Yang
PAMI
2000
142views more  PAMI 2000»
14 years 9 months ago
Evolutionary Pursuit and Its Application to Face Recognition
Abstract-- This paper introduces Evolutionary Pursuit (EP) as a novel and adaptive representation method for image encoding and classification. In analogy to projection pursuit met...
Chengjun Liu, Harry Wechsler
65
Voted
MOC
1998
74views more  MOC 1998»
14 years 9 months ago
Diameters of complete sets of conjugate algebraic integers of small degree
We give bounds for the coefficients of a polynomial as functions of the diameter of its roots, hence we obtain polynomials with minimal diameters and small degree
Michel Grandcolas
DARE
2000
67views more  DARE 2000»
14 years 11 months ago
The rototack: designing a computationally-enhanced craft item
This paper describes our progress in creating a device called a rototack. In its design, the rototack is an example of a computationally-enhanced craft item: a small, robust, inex...
Thomas Wrensch, Glenn Blauvelt, Michael Eisenberg