Sciweavers

5544 search results - page 279 / 1109
» Three Inadequate Models
Sort
View
CLUSTER
2006
IEEE
15 years 8 months ago
Modeling Network Contention Effects on All-to-All Operations
One of the most important collective communication patterns used in scientific applications is the complete exchange, also called All-to-All. Although efficient complete exchange ...
Luiz Angelo Steffenel
142
Voted
ER
2006
Springer
118views Database» more  ER 2006»
15 years 8 months ago
Towards a Reference Ontology for Business Models
Ontologies are viewed as increasingly important tools for structuring domains of intrests. In this paper we propose a reference ontology of business models using concepts from thre...
Birger Andersson, Maria Bergholtz, Ananda Edirisur...
ITS
2000
Springer
137views Multimedia» more  ITS 2000»
15 years 8 months ago
Design Principles for a System to Teach Problem Solving by Modelling
This paper presents an approach to the design of a learning environment in a mathematical domain (elementary combinatorics) where problem solving is based more on modelling than o...
Gérard Tisseau, Hélène Giroir...
ICCV
1995
IEEE
15 years 8 months ago
FORMS: A Flexible Object Recognition and Modelling System
Abstract. We describe a flexible object recognition and modelling system (FORMS) which represents and recognizes animate objects from their silhouettes. This consists of a model fo...
Song Chun Zhu, Alan L. Yuille
FC
2010
Springer
226views Cryptology» more  FC 2010»
15 years 8 months ago
Shoulder-Surfing Safe Login in a Partially Observable Attacker Model
Abstract. Secure login methods based on human cognitive skills can be classified into two categories based on information available to a passive attacker: (i) the attacker fully ob...
Toni Perkovic, Mario Cagalj, Nitesh Saxena