Sciweavers

3760 search results - page 687 / 752
» Logic-Based Probabilistic Modeling
Sort
View
ENTCS
2008
120views more  ENTCS 2008»
15 years 3 months ago
Towards a Quantum Calculus: (Work in Progress, Extended Abstract)
Progress, Extended Abstract) Philippe Jorrand1 Simon Perdrix2 Leibniz Laboratory IMAG-INPG Grenoble, France The aim of this paper is to introduce a general model of quantum comput...
Philippe Jorrand, Simon Perdrix
ENTCS
2006
145views more  ENTCS 2006»
15 years 3 months ago
Real-or-random Key Secrecy of the Otway-Rees Protocol via a Symbolic Security Proof
We present the first cryptographically sound security proof of the well-known Otway-Rees protocol. More precisely, we show that the protocol is secure against arbitrary active att...
Michael Backes
COMCOM
2007
136views more  COMCOM 2007»
15 years 3 months ago
A Delaunay Triangulation based method for wireless sensor network deployment
To obtain a satisfied performance of wireless sensor network, an adaptable sensor deployment method for various applications is essential. In this paper, we propose a centralized ...
Chun-Hsien Wu, Kuo-Chuan Lee, Yeh-Ching Chung
118
Voted
IJISTA
2006
113views more  IJISTA 2006»
15 years 3 months ago
Extraction of mid-level semantics from gesture videos using a Bayesian network
In this paper a method for extraction of mid-level semantics from sign language videos is proposed, by employing high level domain knowledge. The semantics concern labeling of the ...
Dimitrios I. Kosmopoulos, Ilias Maglogiannis
126
Voted
JPDC
2008
122views more  JPDC 2008»
15 years 3 months ago
Stochastic robustness metric and its use for static resource allocations
This research investigates the problem of robust static resource allocation for distributed computing systems operating under imposed Quality of Service (QoS) constraints. Often, ...
Vladimir Shestak, Jay Smith, Anthony A. Maciejewsk...