Sciweavers

20175 search results - page 3926 / 4035
» Is abstraction the key to computing
Sort
View
102
Voted
DCOSS
2009
Springer
14 years 10 months ago
Empirical Evaluation of Wireless Underground-to-Underground Communication in Wireless Underground Sensor Networks
Abstract. Many applications for irrigation management and environment monitoring exploit buried sensors wired-connected to the soil surface for information retrieval. Wireless Unde...
Agnelo R. Silva, Mehmet C. Vuran
DLT
2009
14 years 10 months ago
Branching-Time Temporal Logics with Minimal Model Quantifiers
Abstract. Temporal logics are a well investigated formalism for the specification and verification of reactive systems. Using formal verification techniques, we can ensure the corr...
Fabio Mogavero, Aniello Murano
EJC
2009
14 years 10 months ago
From Word Form Surfaces to Communication
The starting point of this paper is the external surface of a word form, for example the agent-external acoustic perturbations constituting a language sign in speech or the dots o...
Roland Hausser
EUROPKI
2009
Springer
14 years 10 months ago
Automatic Generation of Sigma-Protocols
Efficient zero-knowledge proofs of knowledge (ZK-PoK) are basic building blocks of many cryptographic applications such as identification schemes, group signatures, and secure mult...
Endre Bangerter, Thomas Briner, Wilko Henecka, Ste...
117
Voted
GI
2009
Springer
14 years 10 months ago
AnToNIa: A Software Tool for the Hemodynamic Analysis of Cerebral Vascular Malformations Using 3D and 4D MRA Image Sequences
Abstract: Stroke is the second most common cause of death and major cause of disability worldwide. Approx. 20% of cerebral strokes are caused by hemorrhages due to rupture of cereb...
Nils Daniel Forkert, Dennis Säring, Jens Fieh...
« Prev « First page 3926 / 4035 Last » Next »