Sciweavers

5756 search results - page 1010 / 1152
» Describing Objects by their Attributes
Sort
View
PE
2006
Springer
193views Optimization» more  PE 2006»
13 years 10 months ago
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
IIE
2007
154views more  IIE 2007»
13 years 10 months ago
Computer Aided Modelling Exercises
This paper describes a didactical Computer Aided Software Engineering (CASE)-tool that was developed for use within the context of a course in object-oriented domain modelling. In...
Monique Snoeck, Raf Haesen, Herman Buelens, Manu D...
PRL
2006
117views more  PRL 2006»
13 years 10 months ago
Improving image segmentation quality through effective region merging using a hierarchical social metaheuristic
This paper proposes a new evolutionary region merging method in order to efficiently improve segmentation quality results. Our approach starts from an oversegmented image, which is...
Abraham Duarte, Miguel Ángel Sánchez...
RE
2006
Springer
13 years 10 months ago
Goal and scenario validation: a fluent combination
Scenarios and goals are effective techniques for requirements definition. Goals are objectives that a system has to meet. They are elaborated into a structure that decomposes decla...
Sebastián Uchitel, Robert Chatley, Jeff Kra...
SMA
2008
ACM
131views Solid Modeling» more  SMA 2008»
13 years 10 months ago
Streaming tetrahedral mesh optimization
Improving the quality of tetrahedral meshes is an important operation in many scientific computing applications. Meshes with badly shaped elements impact both the accuracy and con...
Tian Xia, Eric Shaffer
« Prev « First page 1010 / 1152 Last » Next »