Sciweavers

181 search results - page 24 / 37
» Knowledge Provenance
Sort
View
RTSS
2009
IEEE
14 years 4 months ago
New Response Time Bounds for Fixed Priority Multiprocessor Scheduling
Recently, there have been several promising techniques developed for schedulability analysis and response time analysis for multiprocessor systems based on over-approximation. Thi...
Nan Guan, Martin Stigge, Wang Yi, Ge Yu
ACIVS
2008
Springer
14 years 4 months ago
Foliage Recognition Based on Local Edge Information
In many real-world object recognition applications, texture plays a very important role. Much research has gone into texture-based segmentation methods, which focus on finding the...
David Van Hamme, Peter Veelaert, Wilfried Philips,...
ISW
2007
Springer
14 years 3 months ago
Strongly-Secure Identity-Based Key Agreement and Anonymous Extension
Abstract. We study the provable security of identity-based (ID-based) key agreement protocols. Although several published protocols have been proven secure in the random oracle mod...
Sherman S. M. Chow, Kim-Kwang Raymond Choo
WEBI
2007
Springer
14 years 3 months ago
OOPS: User Modeling Method for Task Oriented Mobile Internet Services
Growth in the mobile services industry has remarkably increased in the number of mobile services provided, and present methods of service provision have proven insufficient to gui...
Munehiko Sasajima, Yoshinobu Kitamura, Takefumi Na...
DASFAA
2005
IEEE
136views Database» more  DASFAA 2005»
14 years 3 months ago
Distributed Intersection Join of Complex Interval Sequences
In many different application areas, e.g. space observation systems or engineering systems of world-wide operating companies, there is a need for an efficient distributed intersect...
Hans-Peter Kriegel, Peter Kunath, Martin Pfeifle, ...