Sciweavers

945 search results - page 135 / 189
» Protein Model Representation and Construction
Sort
View
SAINT
2003
IEEE
14 years 2 months ago
Distributed Authentication for Peer-to-Peer Networks
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...
Shardul Gokhale, Partha Dasgupta
HICSS
2000
IEEE
108views Biometrics» more  HICSS 2000»
14 years 1 months ago
Quality Control in Spreadsheets: A Software Engineering-based Approach to Spreadsheet Development
This paper presents work conducted towards the development of an effective software engineering-based methodology for integrity control in the process of spreadsheet development. ...
Kamalasen Rajalingham, David Chadwick, Brian Knigh...
VVS
1998
IEEE
115views Visualization» more  VVS 1998»
14 years 29 days ago
Extracting ISO-Valued Features in 4-Dimensional Scalar Fields
Isosurfaces are an important tool for finding features in 3D scalar data. This paper describes how recursive contour meshing is applied to extract similar features in 4-dimensiona...
Chris Weigle, David C. Banks
ISMIS
1997
Springer
14 years 26 days ago
Automating Spoken Dialogue Systems
Abstract. Spoken dialogue interfaces apply in a number of applications. Engaging in meaningful conversation presupposes the ability to recognize and generate different conversatio...
Mona Singh, James Barnett, Munindar P. Singh
ICRA
1993
IEEE
131views Robotics» more  ICRA 1993»
14 years 25 days ago
Exploration Strategies for Mobile Robots
The problem of programming a robot t o carry out a systematic exploration of its environment using realistic sensors is considered in this paper. The robot is modelled as a single...
Camillo J. Taylor, David J. Kriegman