Sciweavers

2488 search results - page 413 / 498
» An improvement in formal verification
Sort
View
DICS
2006
15 years 5 months ago
Algorithms for Failure Protection in Large IP-over-fiber and Wireless Ad Hoc Networks
We address failure location and restoration in both optical and wireless ad hoc networks. First, we show how Maximum Likelihood inference can improve failure location algorithms in...
Frederick Ducatelle, Luca Maria Gambardella, Macie...
EDBTW
2006
Springer
15 years 5 months ago
Efficiently Processing XML Queries over Fragmented Repositories with PartiX
The data volume of XML repositories and the response time of query processing have become critical issues for many applications, especially for those in the Web. An interesting alt...
Alexandre Andrade, Gabriela Ruberg, Fernanda Arauj...
ISPEC
2010
Springer
15 years 3 months ago
Certificateless KEM and Hybrid Signcryption Schemes Revisited
Often authentication and confidentiality are required as simultaneous key requirements in many cryptographic applications. The cryptographic primitive called signcryption effective...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
DRR
2008
15 years 2 months ago
Whole-book recognition using mutual-entropy-driven model adaptation
We describe an approach to unsupervised high-accuracy recognition of the textual contents of an entire book using fully automatic mutual-entropy-based model adaptation. Given imag...
Pingping Xiu, Henry S. Baird
ACE
2003
86views Education» more  ACE 2003»
15 years 2 months ago
A New Approach to a First Year Undergraduate Information Systems Course
This paper describes the development, implementation and evaluation of a new teaching approach for a large first year undergraduate course in information systems at the University...
Denise Tolhurst, Bob Baker