Sciweavers

567 search results - page 82 / 114
» Reconstructing Numbers from Pairwise Function Values
Sort
View
IPCCC
2006
IEEE
14 years 3 months ago
The delay distribution of IEEE 802.11e EDCA and 802.11 DCF
A number of works have focused on the mean delay performance of IEEE 802.11 [1]. The main contribution of this paper is that it provides a method to obtain the full distribution o...
Paal E. Engelstad, Olav N. Østerbø
CEC
2005
IEEE
14 years 3 months ago
A new representation in evolutionary algorithms for the optimization of bioprocesses
AbstractEvolutionary Algorithms (EAs) have been used to achieve optimal feedforward control in a number of fedbatch fermentation processes. Typically, the optimization purpose is t...
Miguel Rocha, Isabel Rocha, Eugénio C. Ferr...
VISUALIZATION
2000
IEEE
14 years 2 months ago
Extracting regions of interest applying a local watershed transformation
In this paper, we present a new technique for extracting regions of interest (ROI) applying a local watershed transformation. The proposed strategy for computing catchment basins ...
Stanislav L. Stoev, Wolfgang Straßer
BC
1998
58views more  BC 1998»
13 years 9 months ago
Detecting multimodality in saccadic reaction time distributions in gap and overlap tasks
In many cases the distribution of saccadic reaction times (SRT) deviates considerably from a unimodal distribution and may often exhibit several peaks. We present a statistical app...
Stefan Gezeck, Jens Timmer
FSE
2007
Springer
115views Cryptology» more  FSE 2007»
14 years 3 months ago
Improving the Security of MACs Via Randomized Message Preprocessing
Abstract. “Hash then encrypt” is an approach to message authentication, where first the message is hashed down using an ε-universal hash function, and then the resulting k-bi...
Yevgeniy Dodis, Krzysztof Pietrzak