Sciweavers

549 search results - page 110 / 110
» Belief-Based Risk Analysis
Sort
View
BWCCA
2010
13 years 2 months ago
Lifetime Security Improvement in Wireless Sensor Network Using Queue-Based Techniques
A wireless sensor network (WSN) is envisioned as a cluster of tiny power-constrained devices with functions of sensing and communications. Sensors closer to a sink node have a larg...
Fuu-Cheng Jiang, Hsiang-Wei Wu, Der-Chen Huang, Ch...
SIAMREV
2010
108views more  SIAMREV 2010»
13 years 2 months ago
Market Design for Emission Trading Schemes
Abstract. The main thrust of the paper is the design and the numerical analysis of new capand-trade schemes for the control and the reduction of atmospheric pollution. The tools de...
René Carmona, Max Fehr, Juri Hinz, Arnaud P...

Publication
352views
13 years 26 days ago
A Contourlet Transform Feature Extraction Scheme for Ultrasound Thyroid Texture Classification
Ultrasonography is an invaluable and widely used medical imaging tool. Nevertheless, automatic texture analysis on ultrasound images remains a challenging issue. This work presen...
Stamos Katsigiannis, Eystratios G. Keramidas, Dimi...
FUN
2010
Springer
312views Algorithms» more  FUN 2010»
14 years 6 days ago
On Table Arrangements, Scrabble Freaks, and Jumbled Pattern Matching
Given a string s, the Parikh vector of s, denoted p(s), counts the multiplicity of each character in s. Searching for a match of Parikh vector q (a “jumbled string”) in the tex...
Peter Burcsi, Ferdinando Cicalese, Gabriele Fici, ...