Sciweavers

567 search results - page 82 / 114
» Reconstructing Numbers from Pairwise Function Values
Sort
View
IPCCC
2006
IEEE
15 years 6 months ago
The delay distribution of IEEE 802.11e EDCA and 802.11 DCF
A number of works have focused on the mean delay performance of IEEE 802.11 [1]. The main contribution of this paper is that it provides a method to obtain the full distribution o...
Paal E. Engelstad, Olav N. Østerbø
CEC
2005
IEEE
15 years 5 months ago
A new representation in evolutionary algorithms for the optimization of bioprocesses
AbstractEvolutionary Algorithms (EAs) have been used to achieve optimal feedforward control in a number of fedbatch fermentation processes. Typically, the optimization purpose is t...
Miguel Rocha, Isabel Rocha, Eugénio C. Ferr...
VISUALIZATION
2000
IEEE
15 years 4 months ago
Extracting regions of interest applying a local watershed transformation
In this paper, we present a new technique for extracting regions of interest (ROI) applying a local watershed transformation. The proposed strategy for computing catchment basins ...
Stanislav L. Stoev, Wolfgang Straßer
BC
1998
58views more  BC 1998»
14 years 11 months ago
Detecting multimodality in saccadic reaction time distributions in gap and overlap tasks
In many cases the distribution of saccadic reaction times (SRT) deviates considerably from a unimodal distribution and may often exhibit several peaks. We present a statistical app...
Stefan Gezeck, Jens Timmer
FSE
2007
Springer
115views Cryptology» more  FSE 2007»
15 years 6 months ago
Improving the Security of MACs Via Randomized Message Preprocessing
Abstract. “Hash then encrypt” is an approach to message authentication, where first the message is hashed down using an ε-universal hash function, and then the resulting k-bi...
Yevgeniy Dodis, Krzysztof Pietrzak