Sciweavers

700 search results - page 114 / 140
» words 2005
Sort
View
ADHOC
2005
116views more  ADHOC 2005»
14 years 9 months ago
Power efficient routing trees for ad hoc wireless networks using directional antenna
In ad hoc wireless networks, nodes are typically powered by batteries. Therefore saving energy has become a very important objective, and different algorithms have been proposed t...
Fei Dai, Qing Dai, Jie Wu
AIL
2005
134views more  AIL 2005»
14 years 9 months ago
Legal Case-based Reasoning as Practical Reasoning
In this paper we apply a general account of practical reasoning to arguing about legal cases. In particular, we provide a reconstruction of the reasoning of the majority and dissen...
Katie Atkinson, Trevor J. M. Bench-Capon
AMC
2005
178views more  AMC 2005»
14 years 9 months ago
Color image segmentation based on three levels of texture statistical evaluation
In this paper a new and efficient supervised method for color image segmentation is presented. This method improves a part of the automatic extraction problem. The basic technique...
Juan B. Mena, José A. Malpica
89
Voted
AMC
2005
117views more  AMC 2005»
14 years 9 months ago
Teleonomic entropy: measuring the phase-space of end-directed systems
We introduce a novel way of measuring the entropy of a set of values undergoing changes. Such a measure becomes useful when analyzing the temporal development of an algorithm desi...
Alexander Pudmenzky
AMC
2005
138views more  AMC 2005»
14 years 9 months ago
Practical convertible authenticated encryption schemes using self-certified public keys
A convertible authenticated encryption scheme allows a designated receiver to recover and verify a message simultaneously, during which the recipient can prove the dishonesty of t...
Jiqiang Lv, Xinmei Wang, Kwangjo Kim