Sciweavers

35419 search results - page 73 / 7084
» How are we doing
Sort
View
120
Voted
BROADNETS
2006
IEEE
15 years 9 months ago
How to Specify and How to Prove Correctness of Secure Routing Protocols for MANET
Secure routing protocols for mobile ad hoc networks have been developed recently, yet, it has been unclear what are the properties they achieve, as a formal analysis of these prot...
Panagiotis Papadimitratos, Zygmunt J. Haas, Jean-P...
133
Voted
I3
2007
15 years 4 months ago
Identity: How to name it, How to find it
The main objective of this work is to exploit the relationship between the information findability problem and a subject-based organization of information. Identification of a sub...
Christo Dichev, Darina Dicheva, Jan Fischer
110
Voted
WSC
2000
15 years 4 months ago
DoD initiatives in distributed simulation technology: a panel discussion
Panelists respond to three questions, " How does your DoD initiative promise to increase readiness for the fighting forces?", "Where will the distributed simulation...
Phillip Barry, Philomena M. Zimmerman, Jim Metzger...
CVPR
2000
IEEE
16 years 5 months ago
Learning in Gibbsian Fields: How Accurate and How Fast Can It Be?
?Gibbsian fields or Markov random fields are widely used in Bayesian image analysis, but learning Gibbs models is computationally expensive. The computational complexity is pronoun...
Song Chun Zhu, Xiuwen Liu
121
Voted
W4A
2005
ACM
15 years 9 months ago
Do text transcoders improve usability for disabled users?
Text transcoders are web–server systems that produce, on the fly, a text–only version of a web page requested by a user of a browser. Although the potential benefits of text...
Giorgio Brajnik, Daniela Cancila, Daniela Nicoli, ...