Sciweavers

1329 search results - page 251 / 266
» Models and solution techniques for frequency assignment prob...
Sort
View
ISSAC
1997
Springer
142views Mathematics» more  ISSAC 1997»
15 years 1 months ago
The Structure of Sparse Resultant Matrices
Resultants characterize the existence of roots of systems of multivariate nonlinear polynomial equations, while their matrices reduce the computation of all common zeros to a prob...
Ioannis Z. Emiris, Victor Y. Pan
ICAC
2007
IEEE
15 years 1 months ago
Strider Search Ranger: Towards an Autonomic Anti-Spam Search Engine
Search spammers use questionable search engine optimization techniques to promote their spam links into top search results. Large-scale spammers target commerce queries that they ...
Yi-Min Wang, Ming Ma
ESOP
2006
Springer
15 years 1 months ago
A Typed Assembly Language for Confidentiality
Language-based information-flow analysis is promising in protecting data confidentiality. Although much work has been carried out in this area, relatively little has been done for ...
Dachuan Yu, Nayeem Islam
EUC
2008
Springer
14 years 11 months ago
Access Control in Ubiquitous Environments Based on Subjectivity Eliminated Trust Propagation
The first challenge that we tackle in this paper is how to conduct access control in ubiquitous environments where sites have to handle access requests from their own users as wel...
Omar Hasan, Jean-Marc Pierson, Lionel Brunie
CGF
2010
153views more  CGF 2010»
14 years 9 months ago
Localized Delaunay Refinement for Sampling and Meshing
The technique of Delaunay refinement has been recognized as a versatile tool to generate Delaunay meshes of a variety of geometries. Despite its usefulness, it suffers from one la...
Tamal K. Dey, Joshua A. Levine, A. Slatton