Sciweavers

24529 search results - page 4523 / 4906
» Computing on Authenticated Data
Sort
View
MCS
2008
Springer
15 years 4 months ago
Numerical optimal control of the wave equation: optimal boundary control of a string to rest in finite time
In many real-life applications of optimal control problems with constraints in form of partial differential equations (PDEs), hyperbolic equations are involved which typically desc...
Matthias Gerdts, Günter Greif, Hans Josef Pes...
MP
2008
135views more  MP 2008»
15 years 4 months ago
A path to the Arrow-Debreu competitive market equilibrium
: We present polynomial-time interior-point algorithms for solving the Fisher and Arrow-Debreu competitive market equilibrium problems with linear utilities and n players. Both of ...
Yinyu Ye
151
Voted
JWSR
2006
114views more  JWSR 2006»
15 years 4 months ago
Metadata, Ontologies, and Information Models for Grid PSE Toolkits Based on Web Services
: A PSE toolkit is a group of technologies within a software architecture through which multiple PSEs can be built for different application domains. The effective use of a PSE too...
Carmela Comito, Carlo Mastroianni, Domenico Talia
186
Voted
MVA
2008
305views Computer Vision» more  MVA 2008»
15 years 4 months ago
A new graph cut-based multiple active contour algorithm without initial contours and seed points
This paper presents a new graph cut-based multiple active contour algorithm to detect optimal boundaries and regions in images without initial contours and seed points. The task of...
Jong-Sung Kim, Ki-Sang Hong
144
Voted
MAGS
2006
79views more  MAGS 2006»
15 years 4 months ago
Utilizing node's selfishness for providing complete anonymity in peer-to-peer based grids
In this paper, a novel protocol for providing both client and server anonymity in peer-to-peer (P2P) based grids is presented. The protocol assumes individual nodes or users to be...
Rohit Gupta, Souvik Ray, Arun K. Somani, Zhao Zhan...
« Prev « First page 4523 / 4906 Last » Next »