Sciweavers

1466 search results - page 139 / 294
» Completeness of the Authentication Tests
Sort
View
VLDB
2005
ACM
83views Database» more  VLDB 2005»
14 years 1 months ago
Indexing Data-oriented Overlay Networks
The application of structured overlay networks to implement index structures for data-oriented applications such as peer-to-peer databases or peer-to-peer information retrieval, r...
Karl Aberer, Anwitaman Datta, Manfred Hauswirth, R...
IMR
2004
Springer
14 years 1 months ago
Entkerner: A System for Removal of Globally Invisible Triangles from Large Meshes
We present a method that computes a global potentially visible set for the complete region outside the convex hull of an object. The technique is used to remove invisible parts (t...
Manfred Ernst, Frank Firsching, Roberto Grosso
SEMWEB
2004
Springer
14 years 1 months ago
Information Gathering During Planning for Web Service Composition
Abstract. Hierarchical Task-Network (HTN) based planning techniques have been applied to the problem of composing Web Services, especially when described using the OWL-S service on...
Ugur Kuter, Evren Sirin, Dana S. Nau, Bijan Parsia...
SOFTCO
2004
Springer
14 years 1 months ago
Designing Neural Networks Using Gene Expression Programming
Abstract. An artificial neural network with all its elements is a rather complex structure, not easily constructed and/or trained to perform a particular task. Consequently, severa...
Cândida Ferreira
ICN
2009
Springer
14 years 20 days ago
Trainspotting, a WSN-Based Train Integrity System
In contrast to classic train protection systems where most of the safety measures are built into the rail infrastructure, future versions of the European railway safety system ERT...
Hans Scholten, Roel Westenberg, Manfred Schoemaker