Sciweavers

6253 search results - page 1131 / 1251
» Use Case Modeling Guidelines
Sort
View
CASES
2006
ACM
15 years 9 months ago
Architecture and circuit techniques for low-throughput, energy-constrained systems across technology generations
Rising interest in the applications of wireless sensor networks has spurred research in the development of computing systems for lowthroughput, energy-constrained applications. Un...
Mark Hempstead, Gu-Yeon Wei, David Brooks
130
Voted
ECCV
2010
Springer
15 years 7 months ago
Hough Transform and 3D SURF for robust three dimensional classification
Most methods for the recognition of shape classes from 3D datasets focus on classifying clean, often manually generated models. However, 3D shapes obtained through acquisition tech...
IVC
2007
91views more  IVC 2007»
15 years 3 months ago
Evolutionary approach to inverse planning in coplanar radiotherapy
A unified evolutionary approach to coplanar radiotherapy inverse planning is proposed. It consists of a genetic algorithm-based framework that solves with little modification tr...
Vitoantonio Bevilacqua, Giuseppe Mastronardi, Gius...
SP
2010
IEEE
156views Security Privacy» more  SP 2010»
15 years 1 months ago
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes
Abstract--We consider resource-constrained broadcast authentication for n receivers in a static, known network topology. There are only two known broadcast authentication protocols...
Haowen Chan, Adrian Perrig
KDD
2008
ACM
174views Data Mining» more  KDD 2008»
16 years 3 months ago
Effective label acquisition for collective classification
Information diffusion, viral marketing, and collective classification all attempt to model and exploit the relationships in a network to make inferences about the labels of nodes....
Mustafa Bilgic, Lise Getoor
« Prev « First page 1131 / 1251 Last » Next »