Sciweavers

168 search results - page 24 / 34
» An Introduction to Dependent Type Theory
Sort
View
DBSEC
2009
163views Database» more  DBSEC 2009»
13 years 8 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...
JCC
2002
127views more  JCC 2002»
13 years 7 months ago
Effective Born radii in the generalized Born approximation: The importance of being perfect
: Generalized Born (GB) models provide, for many applications, an accurate and computationally facile estimate of the electrostatic contribution to aqueous solvation. The GB models...
Alexey Onufriev, David A. Case, Donald Bashford
INTERSPEECH
2010
13 years 2 months ago
Audio-visual anticipatory coarticulation modeling by human and machine
The phenomenon of anticipatory coarticulation provides a basis for the observed asynchrony between the acoustic and visual onsets of phones in certain linguistic contexts. This ty...
Louis H. Terry, Karen Livescu, Janet B. Pierrehumb...
GECCO
2009
Springer
167views Optimization» more  GECCO 2009»
14 years 2 months ago
Fixed-parameter evolutionary algorithms and the vertex cover problem
In this paper, we consider multi-objective evolutionary algorithms for the Vertex Cover problem in the context of parameterized complexity. We relate the runtime of our algorithms...
Stefan Kratsch, Frank Neumann
JIS
2008
134views more  JIS 2008»
13 years 7 months ago
The quality of evidence in knowledge management research: practitioner versus scholarly literature
The fragmentation of knowledge management (KM) as a field and as an area of research poses serious theoretical challenges for researchers. The viability of KM rests on how the com...
Hamid R. Ekbia, Noriko Hara