Sciweavers

5009 search results - page 933 / 1002
» Value chain modelling using system dynamics
Sort
View
CSREASAM
2003
13 years 11 months ago
Randomized Traitor Tracing Algorithms for Broadcast Security
We introduce and analyze a randomized traitor tracing algorithm for broadcast security. This algorithm is very efficient compared to brute force methods (the mean time it takes is...
Simon McNicol, Serdar Boztas
SCP
1998
163views more  SCP 1998»
13 years 9 months ago
Computing with Continuous Change
A central challenge in computer science and knowledge representation is the integration of conceptual frameworks for continuous and discrete change, as exemplified by the theory ...
Vineet Gupta, Radha Jagadeesan, Vijay A. Saraswat
VIS
2008
IEEE
176views Visualization» more  VIS 2008»
14 years 11 months ago
Particle-based Sampling and Meshing of Surfaces in Multimaterial Volumes
Abstract-- Methods that faithfully and robustly capture the geometry of complex material interfaces in labeled volume data are important for generating realistic and accurate visua...
Miriah Meyer, Ross Whitaker, Robert M. Kirby, C...
ICSE
2003
IEEE-ACM
14 years 10 months ago
Architectural Level Risk Assessment Tool Based on UML Specifications
Recent evidences indicate that most faults in software systems are found in only a few of a system's components [1]. The early identification of these components allows an or...
T. Wang, Ahmed E. Hassan, Ajith Guedem, Walid Abde...
ICASSP
2008
IEEE
14 years 4 months ago
Multiple kernel learning for speaker verification
Many speaker verification (SV) systems combine multiple classifiers using score-fusion to improve system performance. For SVM classifiers, an alternative strategy is to combine...
Chris Longworth, Mark J. F. Gales