Sciweavers

967 search results - page 77 / 194
» Domain Modelling for Ubiquitous Computing Applications
Sort
View
ACSC
2007
IEEE
15 years 1 months ago
Cross-Layer Verification of Type Flaw Attacks on Security Protocols
Security protocols are often specified at the application layer; however, application layer specifications give little detail regarding message data structures at the presentation...
Benjamin W. Long, Colin J. Fidge, David A. Carring...
ACG
2009
Springer
15 years 4 months ago
Performance and Prediction: Bayesian Modelling of Fallible Choice in Chess
Evaluating agents in decision-making applications requires assessing their skill and predicting their behaviour. Both are well developed in Poker-like situations, but less so in mo...
Guy Haworth, Kenneth W. Regan, Giuseppe Di Fatta
BMCBI
2010
123views more  BMCBI 2010»
14 years 10 months ago
Decoding HMMs using the k best paths: algorithms and applications
Background: Traditional algorithms for hidden Markov model decoding seek to maximize either the probability of a state path or the number of positions of a sequence assigned to th...
Daniel G. Brown 0001, Daniil Golod
3DPVT
2006
IEEE
154views Visualization» more  3DPVT 2006»
15 years 4 months ago
Hemispherical Harmonic Surface Description and Applications to Medical Image Analysis
The use of surface harmonics for rigid and nonrigid shape description is well known. In this paper we define a set of complete hemispherical harmonic basis functions on a hemisph...
Heng Huang, Lei Zhang 0002, Dimitris Samaras, Li S...
GEOINFO
2003
14 years 11 months ago
Planning Brazilian Urban Traffic with a Geographic Application Software
Planning and optimizing urban traffic is a difficult problem, with considerable economic and social impacts. The development of suitable software tools to aid municipal governments...
Juliano Lopes de Oliveira, André Constantin...