Sciweavers

3317 search results - page 48 / 664
» Strategies in Rigid-Variable Methods
Sort
View
111
Voted
CEC
2005
IEEE
15 years 9 months ago
Localization using evolution strategies in sensornets
With the emergence of wireless sensor networks and pervasive computing, innovative location-aware technologies and services are being investigated. Several iterative approaches emp...
Mark Terwilliger, Ajay K. Gupta, Ashfaq A. Khokhar...
116
Voted
ICMCS
2005
IEEE
116views Multimedia» more  ICMCS 2005»
15 years 9 months ago
Distance-Level Fusion Strategies for Online Signature Verification
In this paper an approach for combining online signature authentication experts will be proposed. The different experts are based on one feature extraction method presented in our...
Tobias Scheidat, Claus Vielhauer, Jana Dittmann
110
Voted
SAC
2005
ACM
15 years 9 months ago
Limited assignments: a new cutoff strategy for incomplete depth-first search
In this paper, we propose an extension of three incomplete depthfirst search techniques, namely depth-bounded backtrack search, credit search, and iterative broadening, towards pr...
Roman Barták, Hana Rudová
FORMATS
2005
Springer
15 years 9 months ago
On Optimal Timed Strategies
In this paper, we study timed games played on weighted timed automata. In this context, the reachability problem asks if, given a set T of locations and a cost C, Player 1 has a st...
Thomas Brihaye, Véronique Bruyère, J...
138
Voted
PPDP
2005
Springer
15 years 9 months ago
A resolution strategy for verifying cryptographic protocols with CBC encryption and blind signatures
Formal methods have proved to be very useful for analyzing cryptographic protocols. However, most existing techniques apply to the case of abstract encryption schemes and pairing....
Véronique Cortier, Michaël Rusinowitch...