Sciweavers

2192 search results - page 305 / 439
» Plumbing and Other Utilities
Sort
View
ENVSOFT
2006
144views more  ENVSOFT 2006»
13 years 10 months ago
Ten iterative steps in development and evaluation of environmental models
Models are increasingly being relied upon to inform and support natural resource management. They are incorporating an ever broader range of disciplines and now often confront peo...
Anthony J. Jakeman, Rebecca A. Letcher, John P. No...
IJNSEC
2008
113views more  IJNSEC 2008»
13 years 10 months ago
A Fragile Associative Watermarking on 2D Barcode for Data Authentication
Two-dimensional (2D) barcode has improved the information encoded capacity, and it also has enriched the applications of barcode technique. Recently, there are researches dealing ...
Jau-Ji Shen, Po-Wei Hsu
CN
2007
172views more  CN 2007»
13 years 10 months ago
Threshold cryptography in P2P and MANETs: The case of access control
Ad hoc groups, such as peer-to-peer (P2P) systems and mobile ad hoc networks (MANETs) represent recent technological advancements. They support low-cost, scalable and fault-tolera...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
IJAIT
2006
121views more  IJAIT 2006»
13 years 10 months ago
An Efficient Feature Selection Algorithm for Computer-aided Polyp Detection
We present an efficient feature selection algorithm for computer aided detection (CAD) computed tomographic (CT) colonography. The algorithm 1) determines an appropriate piecewise...
Jiang Li, Jianhua Yao, Ronald M. Summers, Nicholas...
IJHCI
2006
95views more  IJHCI 2006»
13 years 10 months ago
Problem Prioritization in Usability Evaluation: From Severity Assessments Toward Impact on Design
Severity assessments enable prioritization of problems encountered during usability evaluations and thereby provide a device for guiding the utilization of design resources. Howeve...
Morten Hertzum