Sciweavers

813 search results - page 78 / 163
» Pipeline-centric provenance model
Sort
View
97
Voted
JKM
2007
88views more  JKM 2007»
15 years 16 days ago
The concept of knowledge in KM: a dimensional model
Purpose: To sharpen the concepts of tacit, implicit and explicit knowledge by linking them to findings from cognitive psychology and memory science and thus finding a possibility ...
Bertolt Meyer, Kozo Sugiyama
INFOCOM
2010
IEEE
14 years 11 months ago
Refresh: Weak Privacy Model for RFID Systems
—Privacy-Preserving Authentication (PPA) is crucial for Radio Frequency Identifcation (RFID)-enabled applications. Without appropriate formal privacy models, it is difficult for...
Li Lu, Yunhao Liu, Xiang-Yang Li
117
Voted
SIAMIS
2010
147views more  SIAMIS 2010»
14 years 11 months ago
Augmented Lagrangian Method, Dual Methods, and Split Bregman Iteration for ROF, Vectorial TV, and High Order Models
In image processing, the Rudin-Osher-Fatemi (ROF) model [L. Rudin, S. Osher, and E. Fatemi, Physica D, 60(1992), pp. 259–268] based on total variation (TV) minimization has prove...
Chunlin Wu, Xue-Cheng Tai
114
Voted
ICLP
2005
Springer
15 years 6 months ago
Modeling Systems in CLP
We present a methodology for the modeling of complex program behavior in CLP. In the first part we present an informal description about how to represent a system in CLP. At its ...
Joxan Jaffar, Andrew E. Santosa, Razvan Voicu
120
Voted
ICRA
2002
IEEE
136views Robotics» more  ICRA 2002»
15 years 5 months ago
Motion Dynamics of a Rover with Slip-Based Traction Model
This paper investigates kinetic behavior of a planetary rover with attention to tire-soil traction mechanics and articulated body dynamics, and thereby study the control when the ...
Kazuya Yoshida, Hiroshida Hamano