Sciweavers

2070 search results - page 268 / 414
» A Reduced-Basis Element Method
Sort
View
136
Voted
CSREASAM
2006
15 years 5 months ago
Application of Gaussian Estimation for Devising Reliable Vulnerability Assessment on SIP-based VoIP Infrastructure
The Session Initiation Protocol (SIP) is an application-layer protocol commonly used in VoIP for communication over the Internet. In this paper we describe a method to assess a pa...
Mohammad Chowdhury, Bon Sy, Rasheed Ahmad
114
Voted
CISST
2003
83views Hardware» more  CISST 2003»
15 years 5 months ago
Computational Efficiency of Structural Image Matching
This paper addresses computational efficiency issues of a new algebraic method for imagery registration/conflation. An algebraic approach to conflation/registration of images does ...
Richard Chase, Boris Kovalerchuk
WSC
2004
15 years 5 months ago
Practical 3D Animation of Multiply Articulated Construction Equipment
This paper presents research that led to the design and implementation of practical 3D animation methods to visualize multiply-articulated construction equipment in 3D animations ...
Vineet R. Kamat, Julio C. Martínez
JUCS
2008
166views more  JUCS 2008»
15 years 3 months ago
Learning Design in Adaptive Educational Hypermedia Systems
: After more than ten years of research aiming at defining methods and techniques to deliver personalized instruction, Adaptive Educational Hypermedia Systems have not made the jum...
Adriana J. Berlanga, Francisco José Garc&ia...
136
Voted
JIIS
2006
147views more  JIIS 2006»
15 years 3 months ago
Mining sequential patterns from data streams: a centroid approach
In recent years, emerging applications introduced new constraints for data mining methods. These constraints are typical of a new kind of data: the data streams. In data stream pro...
Alice Marascu, Florent Masseglia