Sciweavers

16513 search results - page 2972 / 3303
» Numerical Analysis Methods
Sort
View
GRAPHICSINTERFACE
2008
15 years 6 months ago
Order and entropy in picture passwords
Previous efforts involving picture-based passwords have not focused on maintaining a measurably high level of entropy. Since password systems usually allow user selection of passw...
Saranga Komanduri, Dugald Ralph Hutchings
IADIS
2008
15 years 6 months ago
Simulation And Other Facilities To Learn Statistics
For several years, some teachers of the Statistics' Department at the University of Cordoba, with some last course of technical Industrial Engineering in Computer science pup...
José Diz Pérez, Manuel Jurado Bello
ICWN
2008
15 years 6 months ago
Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides
Landslides are one of the environmental disasters that cause massive destruction of human life and infrastructure. Real time monitoring of a landslide prone areas are necessary to...
Ramesh Maneesha, P. Ushakumari
ICMLA
2007
15 years 6 months ago
Soft Failure Detection Using Factorial Hidden Markov Models
In modern business, educational, and other settings, it is common to provide a digital network that interconnects hardware devices for shared access by the users (e.g., in an ofï¬...
Guillaume Bouchard, Jean-Marc Andreoli
ICWN
2007
15 years 6 months ago
PBR: Priority Based Routing in Multi-Sink Sensor Networks
- Wireless sensor networks have been widely used in many fields with the developments of the related techniques. But there are many problems in traditional single sink sensor netwo...
Min Meng, Hui Xu, Xiaoling Wu, Brian J. d'Auriol, ...
« Prev « First page 2972 / 3303 Last » Next »