Sciweavers

2904 search results - page 524 / 581
» Number Forms in the Brain
Sort
View
ANTS
2006
Springer
93views Algorithms» more  ANTS 2006»
14 years 19 days ago
Testing Equivalence of Ternary Cubics
Let C be a smooth plane cubic curve with Jacobian E. We give a formula for the action of the 3-torsion of E on C, and explain how it is useful in studying the 3-Selmer group of an ...
Tom Fisher
BROADNETS
2004
IEEE
14 years 19 days ago
Efficient QoS Provisioning for Adaptive Multimedia in Mobile Communication Networks by Reinforcement Learning
The scarcity and large fluctuations of link bandwidth in wireless networks have motivated the development of adaptive multimedia services in mobile communication networks, where i...
Fei Yu, Vincent W. S. Wong, Victor C. M. Leung
ATAL
2006
Springer
14 years 19 days ago
Certified reputation: how an agent can trust a stranger
Current computational trust models are usually built either on an agent's direct experience of an interaction partner (interaction trust) or reports provided by third parties...
Trung Dong Huynh, Nicholas R. Jennings, Nigel R. S...
DIAL
2004
IEEE
138views Image Analysis» more  DIAL 2004»
14 years 18 days ago
Retrieving Imaged Documents in Digital Libraries Based on Word Image Coding
A great number of documents are scanned and archived in the form of digital images in digital libraries, to make them available and accessible in the Internet. Information retriev...
Yue Lu, Li Zhang, Chew Lim Tan
CCS
2006
ACM
14 years 18 days ago
Safety analysis of usage control authorization models
The usage control (UCON) model was introduced as a unified approach to capture a number of extensions for traditional access control models. While the policy specification flexibi...
Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Pre...