Sciweavers

274 search results - page 42 / 55
» The Construction and Evaluation of Word Space Models
Sort
View
WD
2010
13 years 5 months ago
Vicinity resource cartography for delay-tolerant networks: A holistic perspective
In this paper we propose a distributed approach to construct vicinity resource maps at each node in a delaytolerant network. The scheme uses recent encounters to estimate the avail...
Gabriel Sandulescu, Péter Schaffer, Simin N...
SIGGRAPH
1989
ACM
13 years 11 months ago
Algorithms for solid noise synthesis
A solid noise is a function that defines a random value at each point in space. Solid noises have immediate and powerful applications in surface texturing, stochastic modeling, a...
J. P. Lewis
KDD
2004
ACM
147views Data Mining» more  KDD 2004»
14 years 1 months ago
Semantic representation: search and mining of multimedia content
Semantic understanding of multimedia content is critical in enabling effective access to all forms of digital media data. By making large media repositories searchable, semantic ...
Apostol Natsev, Milind R. Naphade, John R. Smith
SP
2002
IEEE
140views Security Privacy» more  SP 2002»
13 years 7 months ago
Efficient Multicast Packet Authentication Using Signature Amortization
We describe a novel method for authenticating multicast packets that is robust against packet loss. Our main focus is to minimize the size of the communication overhead required t...
Jung Min Park, Edwin K. P. Chong, Howard Jay Siege...
ACISP
2007
Springer
14 years 1 months ago
Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions
We present a new non-interactive message authentication protocol in manual channel model (NIMAP, for short) using the weakest assumption on the manual channel (i.e. assuming the st...
Mohammad Reza Reyhanitabar, Shuhong Wang, Reihaneh...