Sciweavers

489 search results - page 89 / 98
» Computing robust basestock levels
Sort
View
ANLP
1994
105views more  ANLP 1994»
13 years 9 months ago
Modeling Content Identification from Document Images
A new technique to locate content-representing words for a given document image using representation of character shapes is described. A character shape code representation define...
Takehiro Nakayama
ECIR
2010
Springer
13 years 8 months ago
Aggregation of Multiple Judgments for Evaluating Ordered Lists
Abstract. Many tasks (e.g., search and summarization) result in an ordered list of items. In order to evaluate such an ordered list of items, we need to compare it with an ideal or...
Hyun Duk Kim, ChengXiang Zhai, Jiawei Han
ITIIS
2008
128views more  ITIIS 2008»
13 years 7 months ago
An Asymmetric Key-Based Security Architecture for Wireless Sensor Networks
In spite of previous common assumptions about the incompatibility of public key cryptography (PKC) schemes with wireless sensor networks (WSNs), recent works have shown that they ...
Md. Mokammel Haque, Al-Sakib Khan Pathan, Choong S...
IAJIT
2010
166views more  IAJIT 2010»
13 years 6 months ago
Specification and Prototyping of Reactive Distributed Systems with Algebraic Term Nets
: The specification of the dynamic behaviour of reactive distributed systems must exhibit the structures of control and has to imply explicitly the relevant aspects of the distribu...
Faiza Bouchoul, Mohamed Mostefai
CORR
2011
Springer
170views Education» more  CORR 2011»
13 years 2 months ago
Ecosystem Viable Yields
The World Summit on Sustainable Development (Johannesburg, 2002) encouraged the application of the ecosystem approach by 2010. However, at the same Summit, the signatory States un...
Michel De Lara, Eladio Ocaña Anaya, Ricardo...