Sciweavers

697 search results - page 126 / 140
» A Study of Evaluation Functions for the Graph K-Coloring Pro...
Sort
View
IJNSEC
2008
106views more  IJNSEC 2008»
13 years 7 months ago
Parallel Hardware Architectures for the Cryptographic Tate Pairing
Identity-based cryptography uses pairing functions,which are sophisticated bilinear maps defined on elliptic curves.Computing pairings efficiently in software is presently a relev...
Guido Marco Bertoni, Luca Breveglieri, Pasqualina ...
ARTMED
1999
92views more  ARTMED 1999»
13 years 7 months ago
Two-Stage Machine Learning model for guideline development
We present a Two-Stage Machine Learning (ML) model as a data mining method to develop practice guidelines and apply it to the problem of dementia staging. Dementia staging in clin...
Subramani Mani, William Rodman Shankle, Malcolm B....
IAT
2008
IEEE
14 years 2 months ago
An Ambient Intelligent Agent with Awareness of Human Task Execution
To support human functioning, ambient intelligent agents require knowledge about the tasks executed by the human. This knowledge includes design-time information like: (i) the goa...
Fiemke Both, Mark Hoogendoorn, Andy van der Mee, M...
CORR
2006
Springer
95views Education» more  CORR 2006»
13 years 7 months ago
Optimal Distortion-Power Tradeoffs in Gaussian Sensor Networks
We investigate the optimal performance of dense sensor networks by studying the joint source-channel coding problem. The overall goal of the sensor network is to take measurements ...
Nan Liu, Sennur Ulukus
JCIT
2008
245views more  JCIT 2008»
13 years 7 months ago
Quality of Service (QoS) of Voice over MAC Protocol 802.11 using NS-2
Transmitting voice through IP data network can provide significant cost savings. However if not managed properly, voice quality can degrade due to data network congestion. Voice o...
Dileep Kumar, Saleem Ahmed, Yeonseung Ryu