Sciweavers

2741 search results - page 206 / 549
» Engineering Mathematical Knowledge
Sort
View
129
Voted
MOBIHOC
2009
ACM
16 years 4 months ago
Fine-grained boundary recognition in wireless ad hoc and sensor networks by topological methods
Location-free boundary recognition is crucial and critical for many fundamental network functionalities in wireless ad hoc and sensor networks. Previous designs, often coarse-grai...
Dezun Dong, Yunhao Liu, Xiangke Liao
ITICSE
2006
ACM
15 years 9 months ago
Encouraging the development of undergraduate researchers in computer vision
In a small computer science department without a graduate program, it is sometimes difficult to attract research students. This is particularly true for research in computer visio...
Clark F. Olson
ISIPTA
2005
IEEE
140views Mathematics» more  ISIPTA 2005»
15 years 9 months ago
Conservative Rules for Predictive Inference with Incomplete Data
This paper addresses the following question: how should we update our beliefs after observing some incomplete data, in order to make credible predictions about new, and possibly i...
Marco Zaffalon
ISIPTA
2003
IEEE
130views Mathematics» more  ISIPTA 2003»
15 years 8 months ago
Some Results on Generalized Coherence of Conditional Probability Bounds
Based on the coherence principle of de Finetti and a related notion of generalized coherence (g-coherence), we adopt a probabilistic approach to uncertainty based on conditional p...
Veronica Biazzo, Angelo Gilio, Giuseppe Sanfilippo
CTRSA
2007
Springer
93views Cryptology» more  CTRSA 2007»
15 years 7 months ago
Human Identification Through Image Evaluation Using Secret Predicates
Abstract. The task of developing protocols for humans to securely authenticate themselves to a remote server has been an interesting topic in cryptography as a replacement for the ...
Hassan Jameel, Riaz Ahmed Shaikh, Heejo Lee, Sungy...