Sciweavers

357 search results - page 71 / 72
» Fast application development to demonstrate computer graphic...
Sort
View
WIOPT
2005
IEEE
13 years 11 months ago
Secure Comparison of Encrypted Data in Wireless Sensor Networks
End-to-end encryption schemes that support operations over ciphertext are of utmost importance for commercial private party Wireless Sensor Network implementations to become meani...
Mithun Acharya, Joao Girão, Dirk Westhoff
ICDE
2010
IEEE
247views Database» more  ICDE 2010»
14 years 5 months ago
Efficient Verification of Shortest Path Search via Authenticated Hints
Shortest path search in transportation networks is unarguably one of the most important online search services nowadays (e.g., Google Maps, MapQuest, etc), with applications spanni...
Man Lung Yiu, Yimin Lin, Kyriakos Mouratidis
PAMI
2008
121views more  PAMI 2008»
13 years 5 months ago
Theoretical Foundations of Spatially-Variant Mathematical Morphology Part II: Gray-Level Images
In this paper, we develop a spatially-variant (SV) mathematical morphology theory for gray-level signals and images in the euclidean space. The proposed theory preserves the geomet...
Nidhal Bouaynaya, Dan Schonfeld
SAC
2002
ACM
13 years 5 months ago
Semi-automatic design of agent organisations
Designing realistic multi-agent systems is a complex process, which involves specifying not only the functionality of individual agents, but also the authority relationships and l...
Anthony Karageorgos, Simon G. Thompson, Nikolay Me...
AEI
2006
108views more  AEI 2006»
13 years 5 months ago
Grammatical rules for specifying information for automated product data modeling
This paper presents a linguistic framework for developing a formal knowledge acquisition method. The framework is intended to empower domain experts to specify information require...
Ghang Lee, Charles M. Eastman, Rafael Sacks, Shamk...