Sciweavers

3206 search results - page 434 / 642
» Functional Variant Modeling for Adaptable Functional Network...
Sort
View
110
Voted
GD
2004
Springer
15 years 8 months ago
Graph Drawing by Stress Majorization
Abstract. One of the most popular graph drawing methods is based on achieving graph-theoretic target distances. This method was used by Kamada and Kawai [15], who formulated it as ...
Emden R. Gansner, Yehuda Koren, Stephen C. North
DATE
2010
IEEE
148views Hardware» more  DATE 2010»
15 years 7 months ago
DVFS based task scheduling in a harvesting WSN for Structural Health Monitoring
— The task scheduler of an energy harvesting wireless sensor node (WSN) must adapt the task complexity and maximize the accuracy of the tasks within the constraint of limited ene...
A. Ravinagarajan, D. Dondi, Tajana Simunic Rosing
ASIACRYPT
2001
Springer
15 years 7 months ago
Provable Security of KASUMI and 3GPP Encryption Mode f8
Within the security architecture of the 3GPP system there is a standardised encryption mode f8 based on the block cipher KASUMI. In this work we examine the pseudorandomness of the...
Ju-Sung Kang, Sang Uk Shin, Dowon Hong, Okyeon Yi
146
Voted
HUMO
2007
Springer
15 years 6 months ago
Efficient Upper Body Pose Estimation from a Single Image or a Sequence
We propose a method to find candidate 2D articulated model configurations by searching for locally optimal configurations under a weak but computationally manageable fitness functi...
Matheen Siddiqui, Gérard G. Medioni
103
Voted
ETRICS
2006
15 years 6 months ago
Requirements of Information Reductions for Cooperating Intrusion Detection Agents
Abstract. We consider cooperating intrusion detection agents that limit the cooperation information flow with a focus on privacy and confidentiality. Generalizing our previous work...
Ulrich Flegel, Joachim Biskup