Sciweavers

245 search results - page 36 / 49
» The Iterated Weakest Link
Sort
View
CDC
2008
IEEE
120views Control Systems» more  CDC 2008»
15 years 1 months ago
Left invertibility of discrete systems with finite inputs and quantized output
Abstract-- The aim of this paper is to address left invertibility for dynamical systems with inputs and outputs in discrete sets. We study systems that evolve in discrete time with...
Nevio Dubbini, Benedetto Piccoli, Antonio Bicchi
ER
2008
Springer
109views Database» more  ER 2008»
15 years 1 months ago
Value-Driven Coordination Process Design Using Physical Delivery Models
Abstract. Current e-business technology enables the execution of increasingly complex coordination processes that link IT services of different companies. Successful design of cros...
Roel Wieringa, Vincent Pijpers, Lianne Bodenstaff,...
DICTA
2007
15 years 1 months ago
Biometric Based Cryptographic Key Generation from Faces
Existing asymmetric encryption algorithms require the storage of the secret private key. Stored keys are often protected by poorly selected user passwords that can either be guess...
B. Chen, V. Chandran
LREC
2008
132views Education» more  LREC 2008»
15 years 1 months ago
Complete and Consistent Annotation of WordNet using the Top Concept Ontology
This paper presents the complete and consistent ontological annotation of the nominal part of WordNet. The annotation has been carried out using the semantic features defined in t...
Javier Álvez, Jordi Atserias, Jordi Carrera...
CGF
2008
143views more  CGF 2008»
14 years 12 months ago
Sketch-Based Procedural Surface Modeling and Compositing Using Surface Trees
We present a system for creating and manipulating layered procedural surface editing operations, which is motivated by the limited support for iterative design in free-form modeli...
Ryan Schmidt, Karan Singh