Sciweavers

1773 search results - page 333 / 355
» The Visibility-Voronoi Complex and Its Applications
Sort
View
EGITALY
2006
15 years 3 months ago
Easy Access to Huge 3D Models of Works of Art
Automatic shape acquisition technologies evolved rapidly in recent years, and huge mass of 3D data can be easily produced. The high accuracy of range scanning technology makes the...
Marco Callieri, Federico Ponchio, Paolo Cignoni, R...
ATAL
2010
Springer
15 years 3 months ago
Path disruption games
We propose Path Disruption Games (PDGs), which consider collaboration between agents attempting stop an adversary from travelling from a source node to a target node in a graph. P...
Yoram Bachrach, Ely Porat
CORR
2010
Springer
84views Education» more  CORR 2010»
15 years 2 months ago
On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack
As a variant of the HB authentication protocol for RFID systems, which relies on the complexity of decoding linear codes against passive attacks, Madhavan et al. presented Non-Line...
Mohammad Reza Sohizadeh Abyaneh
FUIN
2008
136views more  FUIN 2008»
15 years 1 months ago
Multi-Dimensional Relational Sequence Mining
The issue addressed in this paper concerns the discovery of frequent multi-dimensional patterns from relational sequences. The great variety of applications of sequential pattern m...
Floriana Esposito, Nicola Di Mauro, Teresa Maria A...
107
Voted
FSS
2006
140views more  FSS 2006»
15 years 1 months ago
Advances and challenges in interval-valued fuzzy logic
Among the various extensions to the common [0, 1]-valued truth degrees of "traditional" fuzzy set theory, closed intervals of [0, 1] stand out as a particularly appealin...
Chris Cornelis, Glad Deschrijver, Etienne E. Kerre