Sciweavers

12487 search results - page 2392 / 2498
» Graspable Work Modeling
Sort
View
CISC
2005
Springer
169views Cryptology» more  CISC 2005»
15 years 9 months ago
On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography
Abstract. Despite many good (secure) key agreement protocols based on publickey cryptography exist, secure associations between two wireless devices are often established using sym...
Serge Vaudenay
CVBIA
2005
Springer
15 years 9 months ago
Fast 3D Brain Segmentation Using Dual-Front Active Contours with Optional User-Interaction
Abstract. Important attributes of 3D brain segmentation algorithms include robustness, accuracy, computational efficiency, and facilitation of user interaction, yet few algorithms ...
Hua Li, Anthony J. Yezzi, Laurent D. Cohen
DAMAS
2005
Springer
15 years 9 months ago
Cognitive Agents for Sense and Respond Logistics
We present a novel cognitive agent architecture and demonstrate its effectiveness in the Sense and Respond Logistics (SRL) domain. Effective applications to support SRL must antic...
Kshanti A. Greene, David G. Cooper, Anna L. Buczak...
DIGRA
2005
Springer
15 years 9 months ago
Fictive affinities in Final Fantasy XI: complicit and critical play in fantastic nations.
Like many massively-multiplayer role-playing games, Final Fantasy XI is a persistent world with a heroic fantasy setting. This paper discusses fictive player identities, and descr...
William Huber
ESA
2005
Springer
113views Algorithms» more  ESA 2005»
15 years 9 months ago
Online Bin Packing with Cardinality Constraints
We consider a one dimensional storage system where each container can store a bounded amount of capacity as well as a bounded number of items k ≥ 2. This defines the (standard)...
Leah Epstein
« Prev « First page 2392 / 2498 Last » Next »