Sciweavers

609 search results - page 54 / 122
» Computation of Homology Groups and Generators
Sort
View
EUROPAR
2009
Springer
15 years 6 months ago
Scheduling Recurrent Precedence-Constrained Task Graphs on a Symmetric Shared-Memory Multiprocessor
Abstract. We consider approaches that allow task migration for scheduling recurrent directed-acyclic-graph (DAG) tasks on symmetric, shared-memory multiprocessors (SMPs) in order t...
UmaMaheswari C. Devi
CNSR
2004
IEEE
153views Communications» more  CNSR 2004»
15 years 3 months ago
An Authenticated Broadcasting Scheme for Wireless Ad Hoc Network
In this paper, we propose a pairing-based signcryption scheme for authenticated broadcasting, which requires less computation than a previously proposed scheme suggesting identity...
Muhammad J. Bohio, Ali Miri
BMVC
2002
15 years 2 months ago
Modelling Facial Behaviours
We consider the problem of learning how a person's face behaves in a long video sequence, with the aim of synthesising convincing sequences demonstrating the same behaviours....
Franck Bettinger, Timothy F. Cootes, Christopher J...
IJSN
2006
140views more  IJSN 2006»
14 years 11 months ago
Load-balanced key establishment methodologies in wireless sensor networks
: Wireless Sensor Networks (WSN) pose a need for dynamically establishing a secret key joint to a group of nodes. Elliptic Curve Cryptography (ECC) has emerged as a suitable public...
Ortal Arazi, Hairong Qi
HICSS
2010
IEEE
154views Biometrics» more  HICSS 2010»
15 years 6 months ago
The Effects of Perceived Visual Aesthetics on Process Satisfaction in GSS Use
Although group support systems (GSS) can potentially have tremendous impacts in helping to solve the challenges faced by organizations and societies today, research to date has pr...
Alex Ivanov, Christoph Schneider