Sciweavers

1520 search results - page 20 / 304
» Class Hierarchy Specialization
Sort
View
TPDS
2010
136views more  TPDS 2010»
14 years 8 months ago
Gossip-Based Self-Management of a Recursive Area Hierarchy for Large Wireless SensorNets
—A recursive multi-hop area hierarchy has a number of applications in wireless sensor networks, the most common being scalable point-to-point routing, so-called hierarchical rout...
Konrad Iwanicki, Maarten van Steen
NA
2008
78views more  NA 2008»
14 years 9 months ago
Luigi Gatteschi's work on asymptotics of special functions and their zeros
A good portion of Gatteschi's research publications--about 65%--is devoted to asymptotics of special functions and their zeros. Most prominently among the special functions st...
Walter Gautschi, Carla Giordano
VISUALIZATION
1998
IEEE
15 years 1 months ago
Interpolation of triangle hierarchies
We consider interpolation between keyframe hierarchies. We impose a set of weak constraints that allows smooth interpolation between two keyframe hierarchies in an animation or, m...
Axel Friedrich, Konrad Polthier, Markus Schmies
SAINT
2006
IEEE
15 years 3 months ago
Designing Metadata with Existing Application Ontologies
Among various metadata design difficulties, 1) designing subsumption relation of two classes, 2) designing diverse properties of a given class, and 3) determining whether an item...
Heeryon Cho, Toru Ishida
IJNSEC
2007
131views more  IJNSEC 2007»
14 years 9 months ago
An Asymmetric Cryptographic Key Assignment Scheme for Access Control in Tree Structural Hierarchies
In a hierarchical structure, a user in a security class has access to information items of another class if and only if the former class is a predecessor of latter. Based upon cry...
Debasis Giri, Parmeshwary Dayal Srivastava