Sciweavers

1007 search results - page 89 / 202
» The Complexity of Futile Questioning
Sort
View
96
Voted
INFOCOM
2009
IEEE
15 years 7 months ago
On Cooperative Wireless Network Secrecy
—Given that wireless communication occurs in a shared and inherently broadcast medium, the transmissions are vulnerable to undesired eavesdropping. This occurs even when a point-...
Etienne Perron, Suhas N. Diggavi, Emre Telatar
DNA
2009
Springer
185views Bioinformatics» more  DNA 2009»
15 years 7 months ago
NP-Completeness of the Direct Energy Barrier Problem without Pseudoknots
Knowledge of energy barriers between pairs of secondary structures for a given DNA or RNA molecule is useful, both in understanding RNA function in biological settings and in desig...
Ján Manuch, Chris Thachuk, Ladislav Stacho,...
ICIP
2008
IEEE
15 years 7 months ago
Time-sequential extraction of motion layers
A new time-sequential approach for motion layer extraction is presented. We assume that the scene can be described by a set of layers associated to affine motion models. In one o...
Matthieu Fradet, Patrick Pérez, Philippe Ro...
AGILEDC
2007
IEEE
15 years 7 months ago
The Social Nature of Agile Teams
Agile methodologies represent a ‘people’ centered approach to delivering software. This paper investigates the social processes that contribute to their success. Qualitative g...
Elizabeth Whitworth, Robert Biddle
SMC
2007
IEEE
111views Control Systems» more  SMC 2007»
15 years 7 months ago
Healthcare IT as a source of resilience
—Healthcare information technology (IT) systems can be used to inform workers and managers about changes to workplace vulnerabilities and new means that may be available to meet ...
Christopher P. Nemeth, Richard I. Cook