Sciweavers

2173 search results - page 126 / 435
» On the Values of Reducibility Candidates
Sort
View
JCDL
2003
ACM
101views Education» more  JCDL 2003»
15 years 3 months ago
Bibliographic Attribute Extraction from Erroneous References Based on a Statistical Model
In this paper, we propose a method for extracting bibliographic attributes from reference strings captured using Optical Character Recognition (OCR) and an extended hidden Markov ...
Atsuhiro Takasu
ICPADS
2002
IEEE
15 years 2 months ago
The Impact of RTS Threshold on IEEE 802.11 MAC Protocol
Wireless technologies and applications received great attention in recent years. The medium access control (MAC) protocol is the main element that determines the efficiency in sha...
Shiann-Tsong Sheu, Tobias Chen, Jenhui Chen, Fun Y...
COLT
2000
Springer
15 years 2 months ago
The Computational Complexity of Densest Region Detection
We investigate the computational complexity of the task of detecting dense regions of an unknown distribution from un-labeled samples of this distribution. We introduce a formal l...
Shai Ben-David, Nadav Eiron, Hans-Ulrich Simon
DEXA
1998
Springer
90views Database» more  DEXA 1998»
15 years 2 months ago
On the Correctness of a Transaction Model for Mobile Computing
We discuss and prove the correctness of a transaction model for mobile computing. In our transaction model, we incorporate a prewrite operation (before a write) which does not upda...
Sanjay Kumar Madria, Bharat K. Bhargava
CISC
2007
Springer
108views Cryptology» more  CISC 2007»
15 years 1 months ago
Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures
A multi-secret sharing scheme allows several secrets to be shared amongst a group of participants. In 2005, Shao and Cao developed a verifiable multi-secret sharing scheme where e...
Christophe Tartary, Josef Pieprzyk, Huaxiong Wang