Sciweavers

2899 search results - page 376 / 580
» Dynamic Trees in Practice
Sort
View
ECAI
2004
Springer
14 years 4 months ago
APPROACH: Decentralised Rotation Planning for Container Barges
This paper presents the engineering and development process of a software tool (APPROACH) that is designed for decentralised rotation planning for container barges in the port of R...
Martijn C. Schut, Michael Kentrop, Mark Leenaarts,...
GG
2004
Springer
14 years 4 months ago
A Perspective on Graphs and Access Control Models
There would seem to be a natural connection between graphs and information security. This is particularly so in the arena of access control and authorization. Research on applying ...
Ravi S. Sandhu
MICCAI
2004
Springer
14 years 4 months ago
Statistical Shape Modelling of the Levator Ani with Thickness Variation
The levator ani is vulnerable to injury during childbirth and effective surgical intervention requires full knowledge of the morphology and mechanical properties of the muscle stru...
Su-Lin Lee, Paramate Horkaew, Ara Darzi, Guang-Zho...
QOFIS
2004
Springer
14 years 4 months ago
A New Prediction-Based Routing and Wavelength Assignment Mechanism for Optical Transport Networks
In optical transport networks algorithms dealing with the lightpath selection process select routes and assign wavelengths based on the routing information obtained from the networ...
Eva Marín-Tordera, Xavier Masip-Bruin, Serg...
SACRYPT
2004
Springer
136views Cryptology» more  SACRYPT 2004»
14 years 4 months ago
Cryptanalysis of a White Box AES Implementation
The white box attack context as described in [1, 2] is the common setting where cryptographic software is executed in an untrusted environment—i.e. an attacker has gained access ...
Olivier Billet, Henri Gilbert, Charaf Ech-Chatbi