Sciweavers

3482 search results - page 168 / 697
» In Praise of Numerical Computation
Sort
View
COMPUTING
1998
69views more  COMPUTING 1998»
15 years 4 months ago
Multilevel Norms for H-1/2
We give some estimates related to nite element multilevel splittings and Sobolev norms of negative order. Basically, results for the positive order case are carried over by dualit...
P. Oswald
AES
2007
Springer
75views Cryptology» more  AES 2007»
15 years 4 months ago
Improved FVM for two-layer shallow-water models: Application to the Strait of Gibraltar
This paper deals with the numerical simulation of flows of stratified fluids through channels with irregular geometry. Channel crosssections are supposed to be symmetric but no...
Manuel Jose Castro Díaz, José A. Gar...
ICWS
2009
IEEE
16 years 1 months ago
Supporting Rebinding in BPEL
- The idea of the future internet of services is to combine several services of numerous service providers in new value-added services or applications. To sell these services on th...
Anja Strunk, Iris Braun, Sandro Reichert, Alexande...
331
Voted
CVPR
2010
IEEE
2248views Computer Vision» more  CVPR 2010»
16 years 25 days ago
Morphological Snakes
We introduce a morphological approach to curve evolution. The differential operators used in the standard PDE snake models can be approached using morphological operations...
Luis Álvarez, Luis Baumela, Pedro Henríquez, Pab...
128
Voted
INFOCOM
2008
IEEE
15 years 11 months ago
Lightweight and Compromise-Resilient Message Authentication in Sensor Networks
Abstract—Numerous authentication schemes have been proposed in the past for protecting communication authenticity and integrity in wireless sensor networks. Most of them however ...
Wensheng Zhang, Nalin Subramanian, Guiling Wang