Sciweavers

542 search results - page 77 / 109
» The Denjoy alternative for computable functions
Sort
View
ICPR
2000
IEEE
16 years 3 months ago
Nanometer-Scale Height Measurements in Micromachined Picoliter Vials Based on Interference Fringe Analysis
Micromachined picoliter vials in silicon dioxide with a typical depth of 6.0?m are filled with a liquid sample. Epiilluminated microscopic imaging during evaporation of the liquid...
L. R. Van den Doel, Lucas J. van Vliet, K. T. Hjel...
MOBIHOC
2005
ACM
16 years 1 months ago
An efficient scheme for authenticating public keys in sensor networks
With the advance of technology, Public Key Cryptography (PKC) will sooner or later be widely used in wireless sensor networks. Recently, it has been shown that the performance of ...
Wenliang Du, Ronghua Wang, Peng Ning
107
Voted
PODC
2004
ACM
15 years 7 months ago
Mechanism design for policy routing
The Border Gateway Protocol (BGP) for interdomain routing is designed to allow autonomous systems (ASes) to express policy preferences over alternative routes. We model these pref...
Joan Feigenbaum, Rahul Sami, Scott Shenker
ICWL
2004
Springer
15 years 7 months ago
Learning Algorithms with an Electronic Chalkboard over the Web
This paper describes a system for the animation of algorithms on an electronic chalkboard. The instructor teaching an algorithm can enter data directly through a drawing- the algor...
Margarita Esponda Argüero, Raúl Rojas
TMI
2011
127views more  TMI 2011»
14 years 8 months ago
Reconstruction of Large, Irregularly Sampled Multidimensional Images. A Tensor-Based Approach
Abstract—Many practical applications require the reconstruction of images from irregularly sampled data. The spline formalism offers an attractive framework for solving this prob...
Oleksii Vyacheslav Morozov, Michael Unser, Patrick...