Sciweavers

883 search results - page 94 / 177
» Knowledge Based Reconstruction of Buildings
Sort
View
DASC
2006
IEEE
14 years 1 months ago
Analysing Stream Authentication Protocols in Autonomous Agent-Based Systems
Abstract— In stream authentication protocols used for largescale data dissemination in autonomuous systems, authentication is based on the timing of the publication of keys, and ...
Mehmet A. Orgun, Ji Ma, Chuchang Liu, Guido Govern...
IMA
2005
Springer
126views Cryptology» more  IMA 2005»
14 years 1 months ago
Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme
Abstract. Identity-based encryption (IBE) is a special asymmetric encryption method where a public encryption key can be an arbitrary identifier and the corresponding private decr...
Liqun Chen, Zhaohui Cheng
RULEML
2005
Springer
14 years 1 months ago
A Visual Environment for Developing Defeasible Rule Bases for the Semantic Web
Defeasible reasoning is a rule-based approach for efficient reasoning with incomplete and inconsistent information. Such reasoning is useful for many applications in the Semantic W...
Nick Bassiliades, Efstratios Kontopoulos, Grigoris...
ICCBR
1999
Springer
13 years 12 months ago
REMEX - A Case-Based Approach for Reusing Software Measurement Experienceware
Abstract. For the improvement of software quality and productivity, organizations need to systematically build up and reuse software engineering know-how, promoting organizational ...
Christiane Gresse von Wangenheim
CORR
2010
Springer
164views Education» more  CORR 2010»
13 years 7 months ago
Sub-Nyquist Sampling of Short Pulses: Part I
We develop sub-Nyquist sampling systems for analog signals comprised of several, possibly overlapping, finite duration pulses with unknown shapes and time positions. Efficient sam...
Ewa Matusiak, Yonina C. Eldar