Sciweavers

4761 search results - page 179 / 953
» Generalizing Boundary Points
Sort
View
151
Voted
EOR
2010
88views more  EOR 2010»
15 years 3 months ago
Mathematical programming approaches for generating p-efficient points
Abstract: Probabilistically constrained problems, in which the random variables are finitely distributed, are nonconvex in general and hard to solve. The p-efficiency concept has b...
Miguel A. Lejeune, Nilay Noyan
173
Voted
TMC
2010
179views more  TMC 2010»
15 years 2 months ago
On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews
We explore the use of clock skew of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and accurately. The main goal behind usi...
Suman Jana, Sneha Kumar Kasera
131
Voted
IPMI
2001
Springer
16 years 4 months ago
A Sequential 3D Thinning Algorithm and Its Medical Applications
Skeleton is a frequently applied shape feature to represent the general form of an object. Thinning is an iterative object reduction technique for producing a reasonable approximat...
Kálmán Palágyi, Erich Soranti...
EUROCRYPT
2005
Springer
15 years 9 months ago
Floating-Point LLL Revisited
The Lenstra-Lenstra-Lov´asz lattice basis reduction algorithm (LLL or L3 ) is a very popular tool in public-key cryptanalysis and in many other fields. Given an integer d-dimensi...
Phong Q. Nguyen, Damien Stehlé
162
Voted
ICMI
2004
Springer
189views Biometrics» more  ICMI 2004»
15 years 9 months ago
A multimodal learning interface for sketch, speak and point creation of a schedule chart
We present a video demonstration of an agent-based test bed application for ongoing research into multi-user, multimodal, computer-assisted meetings. The system tracks a two perso...
Edward C. Kaiser, David Demirdjian, Alexander Grue...