Sciweavers

813 search results - page 78 / 163
» Pipeline-centric provenance model
Sort
View
JKM
2007
88views more  JKM 2007»
13 years 9 months ago
The concept of knowledge in KM: a dimensional model
Purpose: To sharpen the concepts of tacit, implicit and explicit knowledge by linking them to findings from cognitive psychology and memory science and thus finding a possibility ...
Bertolt Meyer, Kozo Sugiyama
INFOCOM
2010
IEEE
13 years 7 months ago
Refresh: Weak Privacy Model for RFID Systems
—Privacy-Preserving Authentication (PPA) is crucial for Radio Frequency Identifcation (RFID)-enabled applications. Without appropriate formal privacy models, it is difficult for...
Li Lu, Yunhao Liu, Xiang-Yang Li
SIAMIS
2010
147views more  SIAMIS 2010»
13 years 7 months ago
Augmented Lagrangian Method, Dual Methods, and Split Bregman Iteration for ROF, Vectorial TV, and High Order Models
In image processing, the Rudin-Osher-Fatemi (ROF) model [L. Rudin, S. Osher, and E. Fatemi, Physica D, 60(1992), pp. 259–268] based on total variation (TV) minimization has prove...
Chunlin Wu, Xue-Cheng Tai
ICLP
2005
Springer
14 years 2 months ago
Modeling Systems in CLP
We present a methodology for the modeling of complex program behavior in CLP. In the first part we present an informal description about how to represent a system in CLP. At its ...
Joxan Jaffar, Andrew E. Santosa, Razvan Voicu
ICRA
2002
IEEE
136views Robotics» more  ICRA 2002»
14 years 2 months ago
Motion Dynamics of a Rover with Slip-Based Traction Model
This paper investigates kinetic behavior of a planetary rover with attention to tire-soil traction mechanics and articulated body dynamics, and thereby study the control when the ...
Kazuya Yoshida, Hiroshida Hamano