Sciweavers

1712 search results - page 281 / 343
» A Computational Approach to Binding Theory
Sort
View
OTM
2007
Springer
15 years 7 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
SCIA
2007
Springer
111views Image Analysis» more  SCIA 2007»
15 years 7 months ago
Scale-Space Texture Classification Using Combined Classifiers
Abstract. Since texture is scale dependent, multi-scale techniques are quite useful for texture classification. Scale-space theory introduces multi-scale differential operators. In...
Mehrdad J. Gangeh, Bart M. ter Haar Romeny, C. Esw...
106
Voted
INFOSCALE
2006
ACM
15 years 7 months ago
A library of constructive skeletons for sequential style of parallel programming
Abstract— With the increasing popularity of parallel programming environments such as PC clusters, more and more sequential programmers, with little knowledge about parallel arch...
Kiminori Matsuzaki, Hideya Iwasaki, Kento Emoto, Z...
IUI
2006
ACM
15 years 7 months ago
Ambient Display using Musical Effects
The paper presents a novel approach to the peripheral display of information by applying audio effects to an arbitrary selection of music. We examine a specific instance: the comm...
Luke Barrington, Michael J. Lyons, Dominique Diegm...
IWCMC
2006
ACM
15 years 7 months ago
Priority-based receiver-side relay election in wireless ad hoc sensor networks
Receiver-side relay election has been recently proposed as an alternative to transmitter-side relay selection in wireless ad hoc networks. In this paper we study different priori...
Komlan Egoh, Swades De