Sciweavers

381 search results - page 35 / 77
» Overview of WebCLEF 2006
Sort
View
IJRR
2006
145views more  IJRR 2006»
13 years 7 months ago
Coordinate-free Coverage in Sensor Networks with Controlled Boundaries via Homology
ABSTRACT. We introduce tools from computational homology to verify coverage in an idealized sensor network. Our methods are unique in that, while they are coordinate-free and assum...
V. de Silva, R. Ghrist
INFORMATICALT
2006
75views more  INFORMATICALT 2006»
13 years 7 months ago
Repository for Business Rules Based IS Requirements
The quality of software engineering projects often suffers due to the large gap between the way stakeholders present their requirements and the way analysts capture and express tho...
Kestutis Kapocius, Rimantas Butleris
INTERNET
2006
157views more  INTERNET 2006»
13 years 7 months ago
Distributed Data Mining in Peer-to-Peer Networks
Distributed data mining deals with the problem of data analysis in environments with distributed data, computing nodes, and users. Peer-to-peer computing is emerging as a new dist...
Souptik Datta, Kanishka Bhaduri, Chris Giannella, ...
ISCI
2006
72views more  ISCI 2006»
13 years 7 months ago
A study of particle swarm optimization particle trajectories
Particle swarm optimization (PSO) has shown to be an efficient, robust and simple optimization algorithm. Most of the PSO studies are empirical, with only a few theoretical analys...
F. Van den Bergh, Andries Petrus Engelbrecht
JCS
2006
91views more  JCS 2006»
13 years 7 months ago
A survey of algebraic properties used in cryptographic protocols
Abstract: Cryptographic protocols are successfully analyzed using formal methods. However, formal approaches usually consider the encryption schemes as black boxes and assume that ...
Véronique Cortier, Stéphanie Delaune...