Sciweavers

1645 search results - page 326 / 329
» Rationale-Based Use Case Specification
Sort
View
IOR
2006
177views more  IOR 2006»
13 years 8 months ago
Combinatorial Benders' Cuts for Mixed-Integer Linear Programming
Mixed-Integer Programs (MIP's) involving logical implications modelled through big-M coefficients, are notoriously among the hardest to solve. In this paper we propose and an...
Gianni Codato, Matteo Fischetti
IVC
2006
120views more  IVC 2006»
13 years 8 months ago
Face recognition by fusing thermal infrared and visible imagery
Thermal infrared (IR) imagery offers a promising alternative to visible imagery for face recognition due to its relative insensitive to variations in face appearance caused by ill...
George Bebis, Aglika Gyaourova, Saurabh Singh, Ioa...
JUCS
2008
156views more  JUCS 2008»
13 years 8 months ago
Efficient k-out-of-n Oblivious Transfer Schemes
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme a...
Cheng-Kang Chu, Wen-Guey Tzeng
PRESENCE
2008
185views more  PRESENCE 2008»
13 years 8 months ago
Pilot Evaluation Study of a Virtual Paracentesis Simulator for Skill Training and Assessment: The Beneficial Effect of Haptic Di
Effective, real-time training of health care professionals in invasive procedures is a challenging task. Furthermore, assessing in practice the acquisition of the dexterity and sk...
Costas S. Tzafestas, Kostas Birbas, Yiannis Koumpo...
TIT
2008
134views more  TIT 2008»
13 years 8 months ago
Communication Over MIMO X Channels: Interference Alignment, Decomposition, and Performance Analysis
In a multiple-antenna system with two transmitters and two receivers, a scenario of data communication, known as the X channel, is studied in which each receiver receives data from...
Mohammad Ali Maddah-Ali, Abolfazl S. Motahari, Ami...