Sciweavers

220 search results - page 40 / 44
» ideal 2005
Sort
View
CRYPTO
2005
Springer
171views Cryptology» more  CRYPTO 2005»
14 years 4 months ago
On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes
Error correcting codes and matroids have been widely used in the study of ordinary secret sharing schemes. In this paper, we study the connections between codes, matroids, and a s...
Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge ...
CVBIA
2005
Springer
14 years 4 months ago
A New Coarse-to-Fine Framework for 3D Brain MR Image Registration
Registration, that is, the alignment of multiple images, has been one of the most challenging problems in the field of computer vision. It also serves as an important role in biome...
Terrence Chen, Thomas S. Huang, Wotao Yin, Xiang S...
DAMAS
2005
Springer
14 years 4 months ago
Cognitive Agents for Sense and Respond Logistics
We present a novel cognitive agent architecture and demonstrate its effectiveness in the Sense and Respond Logistics (SRL) domain. Effective applications to support SRL must antic...
Kshanti A. Greene, David G. Cooper, Anna L. Buczak...
GECCO
2005
Springer
154views Optimization» more  GECCO 2005»
14 years 4 months ago
Combining competent crossover and mutation operators: a probabilistic model building approach
This paper presents an approach to combine competent crossover and mutation operators via probabilistic model building. Both operators are based on the probabilistic model buildin...
Cláudio F. Lima, Kumara Sastry, David E. Go...
GI
2005
Springer
14 years 4 months ago
Automated Quality Assurance for UML Models
Abstract: Model based development, like proposed by the OMG’s Model Driven Arre (MDA), aims to raise the level of abstraction from working on the code to working with models. For...
Tilman Seifert, Florian Jug, Günther Rackl