Sciweavers

9405 search results - page 1769 / 1881
» Computing a Model of Set Theory
Sort
View
JCM
2006
169views more  JCM 2006»
15 years 3 months ago
Trends in Middleware for Mobile Ad Hoc Networks
The use of middleware has extended from simply facilitating applications' communication to a broad set of services supporting a huge spectrum of networked and distributed comp...
Salem Hadim, Jameela Al-Jaroodi, Nader Mohamed
PAMI
2006
146views more  PAMI 2006»
15 years 3 months ago
Attention-Based Dynamic Visual Search Using Inner-Scene Similarity: Algorithms and Bounds
A visual search is required when applying a recognition process on a scene containing multiple objects. In such cases, we would like to avoid an exhaustive sequential search. This...
Tamar Avraham, Michael Lindenbaum
IJON
2007
93views more  IJON 2007»
15 years 3 months ago
How much can we trust neural simulation strategies?
Despite a steady improvement of computational hardware, results of numerical simulation are still tightly bound to the simulation tool and strategy used, and may substantially var...
Michelle Rudolph, Alain Destexhe
TCS
2008
15 years 3 months ago
Optimizing deletion cost for secure multicast key management
Multicast and broadcast are efficient ways to deliver messages to a group of recipients in a network. Due to the growing security concerns in various applications, messages are oft...
Zhi-Zhong Chen, Ze Feng, Minming Li, F. Frances Ya...
TITB
2008
152views more  TITB 2008»
15 years 3 months ago
Region of Interest and Multiresolution for Volume Rendering
Medical image interpretation is facing an important challenge resulting from the continuously increasing amount of imaging data. Innovations in medical image visualization are nece...
Sébastien Piccand, Rita Noumeir, Eric Paque...
« Prev « First page 1769 / 1881 Last » Next »