Sciweavers

5948 search results - page 1020 / 1190
» Computing Robust Counter-Strategies
Sort
View
108
Voted
GLVLSI
2005
IEEE
85views VLSI» more  GLVLSI 2005»
15 years 9 months ago
Utilizing don't care states in SAT-based bounded sequential problems
Boolean Satisfiability (SAT) solvers are popular engines used throughout the verification world. Bounded sequential problems such as bounded model checking and bounded sequentia...
Sean Safarpour, Görschwin Fey, Andreas G. Ven...
IAT
2005
IEEE
15 years 9 months ago
Trust Model for Open Ubiquitous Agent Systems
Trust management model that we present is adapted for ubiquitous devices cooperation, rather than for classic client-supplier relationship. We use fuzzy numbers to represent trust...
Martin Rehák, Lukás Foltýn, M...
IAT
2005
IEEE
15 years 9 months ago
Real-time Cooperative Multi-target Tracking by Dense Communication among Active Vision Agents
We have proposed a real-time multi-target tracking system by cooperative behaviors of Active Vision Agents (AVAs), where an AVA is a logical model of a networkconnected computer w...
Norimichi Ukita
125
Voted
ICITA
2005
IEEE
15 years 9 months ago
WiFiAdmin: An Intelligent Web-Based Management Environment for Wireless Networks
Wireless network communities face a number of difficulties due to lack of integration between network and community resources management. In this work, we present a novel solution...
Eythimios Dimopoulos, Athanasios Panousis, Evangel...
128
Voted
ICMCS
2005
IEEE
64views Multimedia» more  ICMCS 2005»
15 years 9 months ago
Joint Image Halftoning and Watermarking in High-Resolution Digital Form
The existing halftone image watermarking methods were proposed to embed a watermark bit in a halftone dot, which corresponds to a pixel, to generate stego halftone image. This one...
Chao-Yong Hsu, Chun-Shien Lu
« Prev « First page 1020 / 1190 Last » Next »