Sciweavers

16513 search results - page 3107 / 3303
» Numerical Analysis Methods
Sort
View
138
Voted
JDCTA
2010
187views more  JDCTA 2010»
14 years 10 months ago
Automatic Verification of Security Properties in Remote Internet Voting Protocol with Applied Pi Calculus
Soundness and coercion resistance are the important and intricate security requirements for remote voting protocols. Several formal models of soundness and coercion-resistance hav...
Bo Meng, Wei Huang, Zimao Li, Dejun Wang
185
Voted
PROMISE
2010
14 years 10 months ago
Prediction of defect distribution based on project characteristics for proactive project management
As software has been pervasive and various software projects have been executed since the 1970s, software project management has played a significant role in software industry. Th...
Youngki Hong, Wondae Kim, Jeongsoo Joo
193
Voted
SIAMMAX
2010
164views more  SIAMMAX 2010»
14 years 10 months ago
Uniqueness of Low-Rank Matrix Completion by Rigidity Theory
The problem of completing a low-rank matrix from a subset of its entries is often encountered in the analysis of incomplete data sets exhibiting an underlying factor model with app...
Amit Singer, Mihai Cucuringu
162
Voted
TSMC
2010
14 years 10 months ago
Can You See Me Now? Sensor Positioning for Automated and Persistent Surveillance
Most existing camera placement algorithms focus on coverage and/or visibility analysis, which ensures that the object of interest is visible in the camera's field of view (FOV...
Yi Yao, Chung-Hao Chen, Besma R. Abidi, David L. P...
136
Voted
TSP
2010
14 years 10 months ago
Noninvertible gabor transforms
Abstract--Time-frequency analysis, such as the Gabor transform, plays an important role in many signal processing applications. The redundancy of such representations is often dire...
Ewa Matusiak, Tomer Michaeli, Yonina C. Eldar
« Prev « First page 3107 / 3303 Last » Next »