Sciweavers

247 search results - page 33 / 50
» A New Cryptosystem Based On Hidden Order Groups
Sort
View
HICSS
2003
IEEE
98views Biometrics» more  HICSS 2003»
14 years 19 days ago
Effectiveness and Applicability of Internet-Based Training in the Corporation - Case of Egypt
Learning is the most indispensable activity in the current knowledge-based economy where firms, in order to compete and survive, must be constantly alert, capable of adapting to f...
Mohamed Ibrahim
AIML
2008
13 years 8 months ago
Valentini's cut-elimination for provability logic resolved
In 1983, Valentini presented a syntactic proof of cut-elimination for a sequent calculus GLSV for the provability logic GL where we have added the subscript V for "Valentini&q...
Rajeev Goré, Revantha Ramanayake
IBPRIA
2005
Springer
14 years 26 days ago
An Algorithm for the Detection of Multiple Concentric Circles
This paper presents a method for the detection of multiple concentric circles which is based on the Hough Transform (HT). In order to reduce time and memory space the concentric ci...
Margarida Silveira
EUROSSC
2008
Springer
13 years 9 months ago
Synthesizing Context for a Sports Domain on a Mobile Device
Abstract. In ubiquitous computing environments there are an increasing number and variety of devices that can generate context data. The challenge is to timely acquire, process, an...
Alisa Devlic, Michal Koziuk, Wybe Horsman
PUK
2003
13 years 8 months ago
On the Decomposition and Concurrent Resolution of a Planning Problem
Planning is known to be a difficult task. One of the approaches used to reduce this difficulty is problem decomposition under divide-and-conquer methodology. This paper introduce...
Laura Sebastia, Eva Onaindia, Eliseo Marzal