Sciweavers

34181 search results - page 6682 / 6837
» The Computer System GRAPHOGRAPH
Sort
View
144
Voted
CN
2007
172views more  CN 2007»
15 years 3 months ago
Threshold cryptography in P2P and MANETs: The case of access control
Ad hoc groups, such as peer-to-peer (P2P) systems and mobile ad hoc networks (MANETs) represent recent technological advancements. They support low-cost, scalable and fault-tolera...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
157
Voted
CN
2007
148views more  CN 2007»
15 years 3 months ago
Using taxonomies for content-based routing with ants
Although the ant metaphor has been successfully applied to routing of data packets both in wireless and fixed networks, little is known yet about its appropriateness for search i...
Elke Michlmayr, Arno Pany, Gerti Kappel
115
Voted
IIE
2006
110views more  IIE 2006»
15 years 3 months ago
The Current Situation of Informatics Education in Mongolia
Mongolia started using Information and Communication Technology (ICT) in secondary education relatively late. The computer training and informatics has been included as a subject i...
Uyanga Sambuu
131
Voted
IJCV
2006
262views more  IJCV 2006»
15 years 3 months ago
A Variational Model for Object Segmentation Using Boundary Information and Shape Prior Driven by the Mumford-Shah Functional
In this paper, we propose a new variational model to segment an object belonging to a given shape space using the active contour method, a geometric shape prior and the Mumford-Sha...
Xavier Bresson, Pierre Vandergheynst, Jean-Philipp...
IJMMS
2006
72views more  IJMMS 2006»
15 years 3 months ago
The use of interface agents for email notification in critical incidents
This study reports on several typical scenarios of the use of email notification interface agents under the influence of critical incidents. An interface agent is a reactive, coll...
Alexander Serenko
« Prev « First page 6682 / 6837 Last » Next »