Sciweavers

5722 search results - page 1105 / 1145
» Security Function Interactions
Sort
View
SMA
2005
ACM
239views Solid Modeling» more  SMA 2005»
14 years 3 months ago
Bender: a virtual ribbon for deforming 3D shapes in biomedical and styling applications
In contrast to machined mechanical parts, the 3D shapes encountered in biomedical or styling applications contain many tubular parts, protrusions, engravings, embossings, folds, a...
Ignacio Llamas, Alexander Powell, Jarek Rossignac,...
COCO
2005
Springer
123views Algorithms» more  COCO 2005»
14 years 3 months ago
If NP Languages are Hard on the Worst-Case Then It is Easy to Find Their Hard Instances
We prove that if NP ⊆ BPP, i.e., if SAT is worst-case hard, then for every probabilistic polynomial-time algorithm trying to decide SAT, there exists some polynomially samplable ...
Dan Gutfreund, Ronen Shaltiel, Amnon Ta-Shma
DCOSS
2005
Springer
14 years 3 months ago
jWebDust : A Java-Based Generic Application Environment for Wireless Sensor Networks
Abstract. Wireless sensor networks can be very useful in applications that require the detection of crucial events, in physical environments subjected to critical conditions, and t...
Ioannis Chatzigiannakis, Georgios Mylonas, Sotiris...
DEXA
2005
Springer
148views Database» more  DEXA 2005»
14 years 3 months ago
XG: A Data-Driven Computation Grid for Enterprise-Scale Mining
In this paper we introduce a novel architecture for data processing, based on a functional fusion between a data and a computation layer. We show how such an architecture can be le...
Radu Sion, Ramesh Natarajan, Inderpal Narang, Wen-...
E4MAS
2005
Springer
14 years 3 months ago
A Survey of Environments and Mechanisms for Human-Human Stigmergy
Stigmergy (the coordination of agents through signs they make and sense in a shared environment) was originally articulated in the study of social insects. Its basic processes are ...
H. Van Dyke Parunak
« Prev « First page 1105 / 1145 Last » Next »