Sciweavers

1116 search results - page 148 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
INFOCOM
2000
IEEE
13 years 11 months ago
Peering and Provisioning of Differentiated Internet Services
A key consideration in building differentiated network services is the feasibility of maintaining stable and consistent service level agreements across multiple networks where allo...
Nemo Semret, Raymond R.-F. Liao, Andrew T. Campbel...
ECIR
2010
Springer
13 years 9 months ago
Aggregation of Multiple Judgments for Evaluating Ordered Lists
Abstract. Many tasks (e.g., search and summarization) result in an ordered list of items. In order to evaluate such an ordered list of items, we need to compare it with an ideal or...
Hyun Duk Kim, ChengXiang Zhai, Jiawei Han
ALGORITHMICA
2007
70views more  ALGORITHMICA 2007»
13 years 8 months ago
Sampling Conformation Space to Model Equilibrium Fluctuations in Proteins
This paper proposes the Protein Ensemble Method (PEM) to model equilibrium fluctuations in proteins where fragments of the protein polypeptide chain can move independently of one ...
Amarda Shehu, Cecilia Clementi, Lydia E. Kavraki
ISF
2002
107views more  ISF 2002»
13 years 7 months ago
A Negotiation Enabling Agent Based Infrastructure: Composition and Behavior
Software agent-based negotiation is a major method to automate the interactions in electronic marketplaces and Internet enabled communities. The traditional approach is to let the...
Nicolae B. Szirbik
IPMI
2007
Springer
14 years 8 months ago
Rao-Blackwellized Marginal Particle Filtering for Multiple Object Tracking in Molecular Bioimaging
Modern live cell fluorescence microscopy imaging systems, used abundantly for studying intra-cellular processes in vivo, generate vast amounts of noisy image data that cannot be pr...
Ihor Smal, Katharina Draegestein, Niels Galjart, W...