Sciweavers

8499 search results - page 72 / 1700
» cans 2009
Sort
View
111
Voted
WASA
2009
Springer
93views Algorithms» more  WASA 2009»
15 years 7 months ago
Experimental Study on Mobile RFID Performance
Abstract. An increasing number of applications use RFID in their design, but there is a lack of understanding of how mobility affects RFID performance in these applications. Unlik...
Zhong Ren, Chiu Chiang Tan, Dong Wang, Qun Li
97
Voted
DGCI
2009
Springer
15 years 5 months ago
Pixel Approximation Errors in Common Watershed Algorithms
Abstract. The exact, subpixel watershed algorithm delivers very accurate watershed boundaries based on a spline interpolation, but is slow and only works in 2D. On the other hand, ...
Hans Meine, Peer Stelldinger, Ullrich Köthe
CANS
2009
Springer
194views Cryptology» more  CANS 2009»
15 years 7 months ago
Algebraic Attack on the MQQ Public Key Cryptosystem
Abstract. In this paper, we present an efficient attack on the multivariate Quadratic Quasigroups (MQQ) public key cryptosystem. Our cryptanalysis breaks the MQQ cryptosystem by so...
Mohamed Saied Emam Mohamed, Jintai Ding, Johannes ...
173
Voted
CP
2009
Springer
16 years 1 months ago
Search Spaces for Min-Perturbation Repair
Many problems require minimally perturbing an initial state in order to repair some violated constraints. We consider two search spaces for exactly solving this minimal perturbatio...
Alex S. Fukunaga
AIMS
2009
Springer
15 years 7 months ago
Knowledge Management and Promises
Ontological modelling for machine inference has featured prominently in IT management research recently, but there is more immediate scope for knowledge modelling in the realm of h...
Mark Burgess