Sciweavers

424 search results - page 45 / 85
» How to build valid and credible simulation models
Sort
View
ICIP
2003
IEEE
14 years 9 months ago
MRA data segmentation using level sets
In this paper, we use a level set based segmentation algorithm to extract the vascular tree from Magnetic Resonance Angiography, "MRA". Classification model finds an opt...
Hossam S. Hassan, Aly A. Farag
CRYPTO
2003
Springer
101views Cryptology» more  CRYPTO 2003»
14 years 1 months ago
The Impact of Decryption Failures on the Security of NTRU Encryption
NTRUEncrypt is unusual among public-key cryptosystems in that, with standard parameters, validly generated ciphertexts can fail to decrypt. This affects the provable security prop...
Nick Howgrave-Graham, Phong Q. Nguyen, David Point...
WICSA
2004
13 years 9 months ago
PACE: An Architectural Style for Trust Management in Decentralized Applications
Distributed applications that lack a central, trustworthy authority for control and validation are properly termed decentralized. Multiple, independent agencies, or "partners...
Girish Suryanarayana, Justin R. Erenkrantz, Scott ...
IDT
2010
124views more  IDT 2010»
13 years 6 months ago
Modelling decision making with probabilistic causation
Humans know how to reason based on cause and effect, but cause and effect is not enough to draw conclusions due to the problem of imperfect information and uncertainty. To resol...
Luís Moniz Pereira, Carroline Kencana Ramli
WSC
1998
13 years 9 months ago
MODSIM III - a Tutorial with Advances in Database Access and HLA Support
MODSIM II is an object-oriented discrete event simulation language featuring extensive run-time libraries, graphical user interface and results presentation tools, database access...
John Goble, Brian Wood