Sciweavers

2550 search results - page 392 / 510
» The Meaning of Open Standards
Sort
View
IANDC
2007
151views more  IANDC 2007»
14 years 11 months ago
Transducer-based analysis of cryptographic protocols
Cryptographic protocols can be divided into (1) protocols where the protocol steps are simple from a computational point of view and can thus be modeled by simple means, for insta...
Ralf Küsters, Thomas Wilke
PRL
2008
236views more  PRL 2008»
14 years 11 months ago
LBP-guided active contours
This paper investigates novel LBP-guided active contour approaches to texture segmentation. The Local Binary Pattern (LBP) operator is well suited for texture representation, comb...
Michalis A. Savelonas, Dimitrios K. Iakovidis, Dim...
84
Voted
SIAMSC
2008
116views more  SIAMSC 2008»
14 years 11 months ago
A New Asymptotic Preserving Scheme Based on Micro-Macro Formulation for Linear Kinetic Equations in the Diffusion Limit
We propose a new numerical scheme for linear transport equations. It is based on a decomposition of the distribution function into equilibrium and non-equilibrium parts. We also us...
Mohammed Lemou, Luc Mieussens
AEI
2005
102views more  AEI 2005»
14 years 11 months ago
Manufacturing planning and predictive process model integration using software agents
Intelligent agents provide a means to integrate various manufacturing software applications. The agents are typically executed in a computer-based collaborative environment, refer...
Shaw C. Feng, Keith A. Stouffer, Kevin K. Jurrens
SYNTHESE
2008
84views more  SYNTHESE 2008»
14 years 11 months ago
How experimental algorithmics can benefit from Mayo's extensions to Neyman-Pearson theory of testing
Although theoretical results for several algorithms in many application domains were presented during the last decades, not all algorithms can be analyzed fully theoretically. Exp...
Thomas Bartz-Beielstein