Sciweavers

549 search results - page 110 / 110
» Belief-Based Risk Analysis
Sort
View
BWCCA
2010
13 years 24 days ago
Lifetime Security Improvement in Wireless Sensor Network Using Queue-Based Techniques
A wireless sensor network (WSN) is envisioned as a cluster of tiny power-constrained devices with functions of sensing and communications. Sensors closer to a sink node have a larg...
Fuu-Cheng Jiang, Hsiang-Wei Wu, Der-Chen Huang, Ch...
SIAMREV
2010
108views more  SIAMREV 2010»
13 years 15 days ago
Market Design for Emission Trading Schemes
Abstract. The main thrust of the paper is the design and the numerical analysis of new capand-trade schemes for the control and the reduction of atmospheric pollution. The tools de...
René Carmona, Max Fehr, Juri Hinz, Arnaud P...

Publication
352views
12 years 11 months ago
A Contourlet Transform Feature Extraction Scheme for Ultrasound Thyroid Texture Classification
Ultrasonography is an invaluable and widely used medical imaging tool. Nevertheless, automatic texture analysis on ultrasound images remains a challenging issue. This work presen...
Stamos Katsigiannis, Eystratios G. Keramidas, Dimi...
FUN
2010
Springer
312views Algorithms» more  FUN 2010»
13 years 10 months ago
On Table Arrangements, Scrabble Freaks, and Jumbled Pattern Matching
Given a string s, the Parikh vector of s, denoted p(s), counts the multiplicity of each character in s. Searching for a match of Parikh vector q (a “jumbled string”) in the tex...
Peter Burcsi, Ferdinando Cicalese, Gabriele Fici, ...