Sciweavers

6592 search results - page 15 / 1319
» On robust cycle bases
Sort
View
TCSV
2008
94views more  TCSV 2008»
13 years 7 months ago
FGS Coding Using Cycle-Based Leaky Prediction Through Multiple Leaky Factors
This paper proposes a fine granularity scalable (FGS) coding using cycle-based leaky prediction, in which the multiple leaky factors are used to yield enhancement layer prediction ...
Xiangyang Ji, Yanyan Zheng, Debin Zhao, Feng Wu, W...
TCS
2010
13 years 5 months ago
A comprehensive analysis of degree based condition for Hamiltonian cycles
— Rahman and Kaykobad introduced a shortest distance based condition for finding the existence of Hamiltonian paths in graphs as follows: Let G be a connected graph with n vertic...
Md. Kamrul Hasan, Mohammad Kaykobad, Young-Koo Lee...
SAC
2003
ACM
14 years 19 days ago
Managing Agent Life Cycles in Open Distributed Systems
Large scale open, heterogeneous, distributed environments such as the Internet, are the environments in which (intelligent) agents need to be able to function and survive. These e...
Frances M. T. Brazier, David G. A. Mobach, Benno J...
DEXAW
2008
IEEE
86views Database» more  DEXAW 2008»
14 years 1 months ago
SERENITY Pattern-Based Software Development Life-Cycle
Francisco Sanchez-Cid, Antonio Maña
ISECS
2008
IEEE
14 years 1 months ago
Probability of Attack Based on System Vulnerability Life Cycle
—The proliferation of exploit codes greatly expedites attacks in cyber world. This research compiles important dates on vulnerability from various sources into five patterns of l...
Amontip Jumratjaroenvanit, Yunyong Teng-amnuay