Sciweavers

1520 search results - page 20 / 304
» Class Hierarchy Specialization
Sort
View
TPDS
2010
136views more  TPDS 2010»
13 years 6 months ago
Gossip-Based Self-Management of a Recursive Area Hierarchy for Large Wireless SensorNets
—A recursive multi-hop area hierarchy has a number of applications in wireless sensor networks, the most common being scalable point-to-point routing, so-called hierarchical rout...
Konrad Iwanicki, Maarten van Steen
NA
2008
78views more  NA 2008»
13 years 7 months ago
Luigi Gatteschi's work on asymptotics of special functions and their zeros
A good portion of Gatteschi's research publications--about 65%--is devoted to asymptotics of special functions and their zeros. Most prominently among the special functions st...
Walter Gautschi, Carla Giordano
VISUALIZATION
1998
IEEE
13 years 12 months ago
Interpolation of triangle hierarchies
We consider interpolation between keyframe hierarchies. We impose a set of weak constraints that allows smooth interpolation between two keyframe hierarchies in an animation or, m...
Axel Friedrich, Konrad Polthier, Markus Schmies
SAINT
2006
IEEE
14 years 1 months ago
Designing Metadata with Existing Application Ontologies
Among various metadata design difficulties, 1) designing subsumption relation of two classes, 2) designing diverse properties of a given class, and 3) determining whether an item...
Heeryon Cho, Toru Ishida
IJNSEC
2007
131views more  IJNSEC 2007»
13 years 7 months ago
An Asymmetric Cryptographic Key Assignment Scheme for Access Control in Tree Structural Hierarchies
In a hierarchical structure, a user in a security class has access to information items of another class if and only if the former class is a predecessor of latter. Based upon cry...
Debasis Giri, Parmeshwary Dayal Srivastava