Sciweavers

947 search results - page 173 / 190
» Analysis of Techniques to Improve Protocol Processing Latenc...
Sort
View
ENVSOFT
2006
144views more  ENVSOFT 2006»
14 years 11 months ago
Ten iterative steps in development and evaluation of environmental models
Models are increasingly being relied upon to inform and support natural resource management. They are incorporating an ever broader range of disciplines and now often confront peo...
Anthony J. Jakeman, Rebecca A. Letcher, John P. No...
TIFS
2008
145views more  TIFS 2008»
14 years 11 months ago
Physical-Layer Authentication
Authentication is the process where claims of identity are verified. Most mechanisms of authentication (e.g., digital signatures and certificates) exist above the physical layer, t...
Paul L. Yu, John S. Baras, Brian M. Sadler
TII
2008
98views more  TII 2008»
14 years 11 months ago
Formal Methods for Systems Engineering Behavior Models
Abstract--Safety analysis in Systems Engineering (SE) processes, as usually implemented, rarely relies on formal methods such as model checking since such techniques, however power...
Charlotte Seidner, Olivier H. Roux
PAMI
2010
171views more  PAMI 2010»
14 years 10 months ago
Automatic Construction of Correspondences for Tubular Surfaces
Abstract— Statistical shape modeling is an established technique and is used for a variety of tasks in medical image processing, such as image segmentation and analysis. A challe...
Toon Huysmans, Jan Sijbers, Brigitte Verdonk
EJWCN
2011
197views more  EJWCN 2011»
14 years 6 months ago
Comparison among Cognitive Radio Architectures for Spectrum Sensing
Recently, the growing success of new wireless applications and services has led to overcrowded licensed bands, inducing the governmental regulatory agencies to consider more flex...
Luca Bixio, Marina Ottonello, Mirco Raffetto, Carl...