Sciweavers

2205 search results - page 427 / 441
» Mutation Operators for Specifications
Sort
View
JPDC
2008
134views more  JPDC 2008»
13 years 7 months ago
Middleware for data mining applications on clusters and grids
This paper gives an overview of two middleware systems that have been developed over the last 6 years to address the challenges involved in developing parallel and distributed imp...
Leonid Glimcher, Ruoming Jin, Gagan Agrawal
JCP
2006
90views more  JCP 2006»
13 years 7 months ago
Using LDA Method to Provide Mobile Location Estimation Services within a Cellular Radio Network
Abstract-- Mobile location estimation is becoming an important value-added service for a mobile phone operator. It is well-known that GPS can provide an accurate location estimatio...
Junyang Zhou, Joseph Kee-Yin Ng
JUCS
2008
156views more  JUCS 2008»
13 years 7 months ago
Efficient k-out-of-n Oblivious Transfer Schemes
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme a...
Cheng-Kang Chu, Wen-Guey Tzeng
JMIV
2006
91views more  JMIV 2006»
13 years 7 months ago
Harmonic Embeddings for Linear Shape Analysis
We present a novel representation of shape for closed contours in R2 or for compact surfaces in R3 explicitly designed to possess a linear structure. This greatly simplifies linear...
Alessandro Duci, Anthony J. Yezzi, Stefano Soatto,...
JMM2
2006
138views more  JMM2 2006»
13 years 7 months ago
A Framework for Constructing Real-time Immersive Environments for Training Physical Activities
Abstract-- This paper describes a framework for constructing a three-dimensional immersive environment that can be used for training physical activities. The system is designed to ...
Sang-Hack Jung, Ruzena Bajcsy