Sciweavers

5101 search results - page 1001 / 1021
» Capturing Context Requirements
Sort
View
SIAMIS
2008
174views more  SIAMIS 2008»
13 years 7 months ago
Efficient Reconstruction of Piecewise Constant Images Using Nonsmooth Nonconvex Minimization
We consider the restoration of piecewise constant images where the number of the regions and their values are not fixed in advance, with a good difference of piecewise constant val...
Mila Nikolova, Michael K. Ng, Shuqin Zhang, Wai-Ki...
IJISEC
2007
61views more  IJISEC 2007»
13 years 7 months ago
Identity-based key agreement protocols from pairings
In recent years, a large number of identity-based key agreement protocols from pairings have been proposed. Some of them are elegant and practical. However, the security of this ty...
Liqun Chen, Zhaohui Cheng, Nigel P. Smart
TASE
2008
IEEE
13 years 7 months ago
Stochastic Modeling of an Automated Guided Vehicle System With One Vehicle and a Closed-Loop Path
Abstract--The use of automated guided vehicles (AGVs) in material-handling processes of manufacturing facilities and warehouses isbecomingincreasinglycommon.AcriticaldrawbackofanAG...
Aykut F. Kahraman, Abhijit Gosavi, Karla J. Oty
IR
2007
13 years 7 months ago
Restricted inflectional form generation in management of morphological keyword variation
Word form normalization through lemmatization or stemming is a standard procedure in information retrieval because morphological variation needs to be accounted for and several la...
Kimmo Kettunen, Eija Airio, Kalervo Järvelin
TIFS
2008
149views more  TIFS 2008»
13 years 7 months ago
Secure Cooperation in Autonomous Mobile Ad-Hoc Networks Under Noise and Imperfect Monitoring: A Game-Theoretic Approach
In autonomous mobile ad-hoc networks, one major challenge is to stimulate cooperation among selfish nodes, especially when some nodes may be malicious. In this paper, we address co...
Wei Yu, K. J. Ray Liu
« Prev « First page 1001 / 1021 Last » Next »