Sciweavers

168 search results - page 29 / 34
» Chain Intersecting Families
Sort
View
ACISP
2007
Springer
13 years 11 months ago
Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication
We study the multicast stream authentication problem when the communication channel is under control of an opponent who can drop, reorder and inject data packets. In this work, we...
Christophe Tartary, Huaxiong Wang
AOSE
2006
Springer
13 years 11 months ago
Applying the Governance Framework Technique to Promote Maintainability in Open Multi-Agent Systems
Abstract. Governance means that specifications are enforced dynamically at application runtime. Governance framework is a technique to design and implement an extensible interactio...
Gustavo R. de Carvalho, Carlos José Pereira...
ICCV
1995
IEEE
13 years 11 months ago
Algorithms for Implicit Deformable Models
This paper presents a framework for implicit deformable models and a pair of new algorithms for solving the nonlinear partial di erential equations that result from this framework...
Ross T. Whitaker
NIPS
2008
13 years 9 months ago
Stochastic Relational Models for Large-scale Dyadic Data using MCMC
Stochastic relational models (SRMs) [15] provide a rich family of choices for learning and predicting dyadic data between two sets of entities. The models generalize matrix factor...
Shenghuo Zhu, Kai Yu, Yihong Gong
JCM
2007
113views more  JCM 2007»
13 years 7 months ago
Reinventing Healthcare Service through M-care Business Model: The Strategy Analysis of WiMAX Adoption
—To address the emerging issues of aging society, new technology creates many opportunities to solve the problem of care service and increases added-value in the digital family. ...
Paul T. Y. Tseng, Huei-Huang Chen