Sciweavers

12981 search results - page 2526 / 2597
» Model Checking and Abstraction
Sort
View
CISC
2005
Springer
169views Cryptology» more  CISC 2005»
15 years 7 months ago
On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography
Abstract. Despite many good (secure) key agreement protocols based on publickey cryptography exist, secure associations between two wireless devices are often established using sym...
Serge Vaudenay
CP
2005
Springer
15 years 7 months ago
2-Way vs. d-Way Branching for CSP
Abstract. Most CSP algorithms are based on refinements and extensions of backtracking, and employ one of two simple “branching schemes”: 2-way branching or d-way branching, fo...
Joey Hwang, David G. Mitchell
CVBIA
2005
Springer
15 years 7 months ago
Fast 3D Brain Segmentation Using Dual-Front Active Contours with Optional User-Interaction
Abstract. Important attributes of 3D brain segmentation algorithms include robustness, accuracy, computational efficiency, and facilitation of user interaction, yet few algorithms ...
Hua Li, Anthony J. Yezzi, Laurent D. Cohen
ER
2005
Springer
200views Database» more  ER 2005»
15 years 7 months ago
How to Tame a Very Large ER Diagram (Using Link Analysis and Force-Directed Drawing Algorithms)
Abstract. Understanding a large schema without the assistance of persons already familiar with it (and its associated applications), is a hard and very time consuming task that occ...
Yannis Tzitzikas, Jean-Luc Hainaut
EUROCAST
2005
Springer
102views Hardware» more  EUROCAST 2005»
15 years 7 months ago
Approximation Problems Categories
abstract NP-hard optimization problem, in a general sense. From the observation that, intuitively, there are many connections among categorical concepts and structural complexity n...
Liara Aparecida dos Santos Leal, Dalcidio Moraes C...
« Prev « First page 2526 / 2597 Last » Next »