Sciweavers

2125 search results - page 414 / 425
» Points with Type-2 Operations
Sort
View
JSS
2007
121views more  JSS 2007»
13 years 7 months ago
Opportunistic prioritised clustering framework for improving OODBMS performance
In object oriented database management systems, clustering has proven to be one of the most effective performance enhancement techniques. Existing clustering algorithms are mainly...
Zhen He, Richard Lai, Alonso Marquez, Stephen Blac...
TWC
2008
154views more  TWC 2008»
13 years 7 months ago
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks
User authentication is essential in service-oriented communication networks to identify and reject any unauthorized network access. The state-of-the-art practice in securing wirele...
Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen...
COMCOM
2004
145views more  COMCOM 2004»
13 years 7 months ago
Framework based on stochastic L-Systems for modeling IP traffic with multifractal behavior
In a previous work we have introduced a multifractal traffic model based on so-called stochastic L-Systems, which were introduced by biologist A. Lindenmayer as a method to model ...
Paulo Salvador, António Nogueira, Rui T. Va...
CGF
2002
184views more  CGF 2002»
13 years 7 months ago
The 3D Model Acquisition Pipeline
Three-dimensional (3D) image acquisition systems are rapidly becoming more affordable, especially systems based on commodity electronic cameras. At the same time, personal compute...
Fausto Bernardini, Holly E. Rushmeier
ENTCS
2002
144views more  ENTCS 2002»
13 years 7 months ago
Logics and Multi-agents: towards a new symbolic model of cognition
Abstract The last edition of CLIMA, held in 2001 in Paphos (Cyprus) ended with a panel session on the role of Computational Logic (CL) in Multi-Agent Systems (MAS). Two dimensions ...
Paolo Torroni