Sciweavers

1898 search results - page 172 / 380
» Weak Keys for IDEA
Sort
View
CCCG
2003
13 years 10 months ago
Computing Delaunay Triangulation with Imprecise Input Data
The key step in the construction of the Delaunay triangulation of a finite set of planar points is to establish correctly whether a given point of this set is inside or outside t...
Ali Asghar Khanban, Abbas Edalat
CMS
2003
101views Communications» more  CMS 2003»
13 years 10 months ago
Watermark Security via Secret Wavelet Packet Subband Structures
Abstract. Wavelet packet decompositions generalize the classical pyramidal wavelet structure. We use the vast amount of possible wavelet packet decomposition structures to create a...
Werner Dietl, Andreas Uhl
IFIP13
2004
13 years 10 months ago
Failure Analysis and the Safety-Case Lifecycle
: The failure of a safety-critical system, though undesirable, is often a source of valuable lessons that can help prevent future failures. Current analysis practices do not always...
William S. Greenwell, Elisabeth A. Strunk, John C....
IFIP13
2004
13 years 10 months ago
Designing Distributed Task Performance in Safety-Critical Systems Equipped With Mobile Devices
: This paper describes a method aiming to support the design of interactive-safety critical systems. The method proposes an original integration of approaches usually considered se...
Ana-Maria Marhan, Fabio Paternò, Carmen San...
HCI
2001
13 years 10 months ago
Structureless, intention-guided web sites: planning based adaptation
The great variety of users of the services available on the internet raised the problem of finding flexible forms of presentation and interaction, which depend on the specific user...
Matteo Baldoni, Cristina Baroglio, Viviana Patti