Sciweavers

5401 search results - page 156 / 1081
» Using Versions in GIS
Sort
View
JCP
2006
120views more  JCP 2006»
15 years 3 months ago
Password-authenticated Key Exchange using Efficient MACs
Abstract-- This paper is concerned with passwordauthenticated key agreement protocols. Designing such protocols represents an interesting challenge since there is no standard way o...
Maurizio Adriano Strangio
NN
2006
Springer
15 years 3 months ago
Use of a neuro-variational inversion for retrieving oceanic and atmospheric constituents from satellite ocean colour sensor: App
This paper presents a new development of the NeuroVaria method. NeuroVaria computes relevant atmospheric and oceanic parameters by minimizing the difference between the observed s...
Julien Brajard, Cédric Jamet, Cyril Moulin,...
PVLDB
2008
116views more  PVLDB 2008»
15 years 3 months ago
Anonymizing bipartite graph data using safe groupings
Private data often comes in the form of associations between entities, such as customers and products bought from a pharmacy, which are naturally represented in the form of a larg...
Graham Cormode, Divesh Srivastava, Ting Yu, Qing Z...
ACCV
2010
Springer
14 years 11 months ago
Spatiotemporal Contour Grouping Using Abstract Part Models
Part Models Pablo Sala1 , Diego Macrini2 , and Sven Dickinson1 1 University of Toronto, 2 Queen's University Abstract. In recent work [1], we introduced a framework for modelr...
Pablo Sala, Diego Macrini, Sven J. Dickinson
120
Voted
ADVAI
2010
110views more  ADVAI 2010»
14 years 10 months ago
Using Genetic Algorithms to Represent Higher-Level Planning in Simulation Models of Conflict
The focus of warfare has shifted from the Industrial Age to the Information Age, as encapsulated by the term Network Enabled Capability. This emphasises information sharing, comma...
James Moffat, Susan Fellows