Sciweavers

1891 search results - page 344 / 379
» Constrained Subspace Modelling
Sort
View
JDCTA
2010
187views more  JDCTA 2010»
13 years 2 months ago
Automatic Verification of Security Properties in Remote Internet Voting Protocol with Applied Pi Calculus
Soundness and coercion resistance are the important and intricate security requirements for remote voting protocols. Several formal models of soundness and coercion-resistance hav...
Bo Meng, Wei Huang, Zimao Li, Dejun Wang
WWW
2003
ACM
14 years 8 months ago
Presentation Dynamism in XML Functional Programming meets SMIL Animation
The move towards a semantic web will produce an increasing number of presentations whose creation is based upon semantic queries. Intelligent presentation generation engines have ...
Patrick Schmitz, Simon J. Thompson, Peter R. King
KDD
2006
ACM
134views Data Mining» more  KDD 2006»
14 years 8 months ago
Learning to rank networked entities
Several algorithms have been proposed to learn to rank entities modeled as feature vectors, based on relevance feedback. However, these algorithms do not model network connections...
Alekh Agarwal, Soumen Chakrabarti, Sunny Aggarwal
ISCAS
2006
IEEE
133views Hardware» more  ISCAS 2006»
14 years 1 months ago
Neuronal ion-channel dynamics in silicon
Abstract— We present a simple silicon circuit for modelling voltagedependent ion channels found within neural cells, capturing both the gating particle’s sigmoidal activation (...
Kai M. Hynna, Kwabena Boahen
COORDINATION
2004
Springer
14 years 1 months ago
Active Coordination in Ad Hoc Networks
The increasing ubiquity of mobile devices has led to an explosion in the development of applications tailored to the particular needs of individual users. As the research communit...
Christine Julien, Gruia-Catalin Roman