Sciweavers

700 search results - page 114 / 140
» words 2005
Sort
View
129
Voted
ADHOC
2005
116views more  ADHOC 2005»
15 years 10 days ago
Power efficient routing trees for ad hoc wireless networks using directional antenna
In ad hoc wireless networks, nodes are typically powered by batteries. Therefore saving energy has become a very important objective, and different algorithms have been proposed t...
Fei Dai, Qing Dai, Jie Wu
113
Voted
AIL
2005
134views more  AIL 2005»
15 years 10 days ago
Legal Case-based Reasoning as Practical Reasoning
In this paper we apply a general account of practical reasoning to arguing about legal cases. In particular, we provide a reconstruction of the reasoning of the majority and dissen...
Katie Atkinson, Trevor J. M. Bench-Capon
116
Voted
AMC
2005
178views more  AMC 2005»
15 years 10 days ago
Color image segmentation based on three levels of texture statistical evaluation
In this paper a new and efficient supervised method for color image segmentation is presented. This method improves a part of the automatic extraction problem. The basic technique...
Juan B. Mena, José A. Malpica
AMC
2005
117views more  AMC 2005»
15 years 10 days ago
Teleonomic entropy: measuring the phase-space of end-directed systems
We introduce a novel way of measuring the entropy of a set of values undergoing changes. Such a measure becomes useful when analyzing the temporal development of an algorithm desi...
Alexander Pudmenzky
98
Voted
AMC
2005
138views more  AMC 2005»
15 years 10 days ago
Practical convertible authenticated encryption schemes using self-certified public keys
A convertible authenticated encryption scheme allows a designated receiver to recover and verify a message simultaneously, during which the recipient can prove the dishonesty of t...
Jiqiang Lv, Xinmei Wang, Kwangjo Kim