Sciweavers

396 search results - page 47 / 80
» How scientific models can explain
Sort
View
CSFW
2005
IEEE
14 years 1 months ago
Temporal Rank Functions for Forward Secrecy
A number of key establishment protocols claim the property of forward secrecy, where the compromise of a longterm key does not result in the compromise of previously computed sess...
Rob Delicata, Steve A. Schneider
SEUS
2005
IEEE
14 years 1 months ago
Resource Management Based on Personal Service Aggregations in Smart Spaces
This paper introduces a novel resource management approach based on personal service aggregations(PSAs) for smart spaces. As a smart space is usually a sharable system that simult...
Peifeng Xiang, Yuanchun Shi
CONTEXT
2003
Springer
14 years 25 days ago
GRAVA: An Architecture Supporting Automatic Context Transitions and Its Application to Robust Computer Vision
We describe a software development approach for vision that enhances robustness by making novel use of context. Conventional approaches to most image understanding problems suffe...
Paul Robertson, Robert Laddaga
CP
2003
Springer
14 years 25 days ago
Propagating N-Ary Rigid-Body Constraints
In this paper, we present an algorithm to propagate an n-ary constraint (with n greater than 2) specifying the relative positions of points in a three-dimensional rigid group. The ...
Ludwig Krippahl, Pedro Barahona
INFOCOM
1999
IEEE
13 years 12 months ago
An Efficient Algorithm for Optimal Wavelength Converter Placement on Wavelength-Routed Networks with Arbitrary Topologies
Abstract- This paper describes an algorithm for optimally placing a given number of wavelength converters in All-Optical Networks(A0Ns) with arbitrary topologies. We first introduc...
Sashisekaran Thiagarajan, Arun K. Somani