Sciweavers

8337 search results - page 1468 / 1668
» Reasoning With Characteristic Models
Sort
View
ICMI
2005
Springer
113views Biometrics» more  ICMI 2005»
15 years 10 months ago
Automatic detection of interaction groups
This paper addresses the problem of detecting interaction groups in an intelligent environment. To understand human activity, we need to identify human actors and their interperso...
Oliver Brdiczka, Jérôme Maisonnasse, ...
ICS
2005
Tsinghua U.
15 years 10 months ago
Optimization of MPI collective communication on BlueGene/L systems
BlueGene/L is currently the world’s fastest supercomputer. It consists of a large number of low power dual-processor compute nodes interconnected by high speed torus and collect...
George Almási, Philip Heidelberger, Charles...
IMA
2005
Springer
126views Cryptology» more  IMA 2005»
15 years 10 months ago
Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme
Abstract. Identity-based encryption (IBE) is a special asymmetric encryption method where a public encryption key can be an arbitrary identifier and the corresponding private decr...
Liqun Chen, Zhaohui Cheng
IWINAC
2005
Springer
15 years 10 months ago
Spatial navigation based on novelty mediated autobiographical memory
This paper presents a method for spatial navigation performed mainly on past experiences. The past experiences are remembered in their temporal context, i.e. as episodes of events....
Emilia I. Barakova, Tino Lourens
135
Voted
KES
2005
Springer
15 years 10 months ago
A Robust Approach for Improving Computational Efficiency of Order-Picking Problems
The new market forces have affected the operation of distribution centers (DCs) extremely. The DCs demand an increased productivity and a low cost in their daily operation. This pa...
Yu-Min Chiang, Shih-Hsin Chen, Kuo-Chang Wu
« Prev « First page 1468 / 1668 Last » Next »