Sciweavers

3482 search results - page 168 / 697
» In Praise of Numerical Computation
Sort
View
70
Voted
COMPUTING
1998
69views more  COMPUTING 1998»
15 years 15 days ago
Multilevel Norms for H-1/2
We give some estimates related to nite element multilevel splittings and Sobolev norms of negative order. Basically, results for the positive order case are carried over by dualit...
P. Oswald
95
Voted
AES
2007
Springer
75views Cryptology» more  AES 2007»
15 years 28 days ago
Improved FVM for two-layer shallow-water models: Application to the Strait of Gibraltar
This paper deals with the numerical simulation of flows of stratified fluids through channels with irregular geometry. Channel crosssections are supposed to be symmetric but no...
Manuel Jose Castro Díaz, José A. Gar...
ICWS
2009
IEEE
15 years 10 months ago
Supporting Rebinding in BPEL
- The idea of the future internet of services is to combine several services of numerous service providers in new value-added services or applications. To sell these services on th...
Anja Strunk, Iris Braun, Sandro Reichert, Alexande...
CVPR
2010
IEEE
2248views Computer Vision» more  CVPR 2010»
15 years 9 months ago
Morphological Snakes
We introduce a morphological approach to curve evolution. The differential operators used in the standard PDE snake models can be approached using morphological operations...
Luis Álvarez, Luis Baumela, Pedro Henríquez, Pab...
INFOCOM
2008
IEEE
15 years 7 months ago
Lightweight and Compromise-Resilient Message Authentication in Sensor Networks
Abstract—Numerous authentication schemes have been proposed in the past for protecting communication authenticity and integrity in wireless sensor networks. Most of them however ...
Wensheng Zhang, Nalin Subramanian, Guiling Wang