Sciweavers

10773 search results - page 1948 / 2155
» Ambient Computational Environments
Sort
View
JDCTA
2010
150views more  JDCTA 2010»
14 years 11 months ago
Provable Password-Authenticated Key Exchange Protocol against Imposter Attack on Ad Hoc Networks
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both ...
Ang Gao
PC
2010
100views Management» more  PC 2010»
14 years 11 months ago
Analysis of the solution phase of a parallel multifrontal approach
We study the forward and backward substitution phases of a sparse multifrontal factorization. These phases are often neglected in papers on sparse direct factorization but, in man...
Patrick Amestoy, Iain S. Duff, Abdou Guermouche, T...
PUC
2010
205views more  PUC 2010»
14 years 11 months ago
A database-based framework for gesture recognition
Abstract Gestures are an important modality for human-machine communication. Computer vision modules performing gesture recognition can be important components of intelligent homes...
Vassilis Athitsos, Haijing Wang, Alexandra Stefan
SEMWEB
2010
Springer
14 years 11 months ago
Theoretical foundations and engineering tools for building ontologies as reference conceptual models
Abstract. Perhaps the most fundamental notion underlying the desiderata for a successful Semantic Web is Semantic Interoperability. In this context, ontologies have been more and m...
Giancarlo Guizzardi
TON
2010
188views more  TON 2010»
14 years 11 months ago
Self-Chord: A Bio-Inspired P2P Framework for Self-Organizing Distributed Systems
This paper presents "Self-Chord," a peer-to-peer (P2P) system that inherits the ability of Chord-like structured systems for the construction and maintenance of an overla...
Agostino Forestiero, Emilio Leonardi, Carlo Mastro...
« Prev « First page 1948 / 2155 Last » Next »