We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 61-80 of 104 results
  1. A GPU-Based Simulation of Tsunami Propagation and Inundation

    Tsunami simulation consists of fluid dynamics, numerical computations, and visualization techniques. Nonlinear shallow water equations are often used...
    Wen-Yew Liang, Tung-Ju Hsieh, ... Chin-Chuan Han in Algorithms and Architectures for Parallel Processing
    Conference paper 2009
  2. A Novel Adaptive Reclosure Criterion for HV Transmission Lines Based on Wavelet Packet Energy Entropy

    A novel adaptive reclosure criterion based on energy entropy to identify faults for HV transmission lines is presented in the paper on the basis of...
    Yuanyuan Zhang, Qingwu Gong, ** Shi in Advances in Neural Networks – ISNN 2009
    Conference paper 2009
  3. Shape Extraction through Region-Contour Stitching

    We present a graph-based contour extraction algorithm for images with low contrast regions and faint contours. Our innovation consists of a new graph...
    Elena Bernardis, Jianbo Shi in Advances in Visual Computing
    Conference paper 2008
  4. Let’s Get It Started: Installing Ruby

    Ruby is a popular programming language, but not many computers understand it by default. This chapter takes you through the steps necessary to get...
    Chapter 2007
  5. Unbalanced Underground Distribution Systems Fault Detection and Section Estimation

    This paper presents a novel fault detection and section estimation method for unbalanced underground distribution systems (UDS). The method proposed...
    Karen Rezende Caino de Oliveira, Rodrigo Hartstein Salim, ... Arturo Suman Bretas in Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence
    Conference paper 2007
  6. The Maximum Solution Problem on Graphs

    We study the complexity of the problem Max Sol which is a natural optimisation version of the graph homomorphism problem. Given a fixed target graph...
    Peter Jonsson, Gustav Nordh, Johan Thapper in Mathematical Foundations of Computer Science 2007
    Conference paper 2007
  7. Bestandsaufnahme realisierter mobiler IKT-Lösungen

    Die folgende, bisher umfassendste Bestandsaufnahme realisierter mobiler Lösungen beruht auf eigenen empirischen Anwendungsstudien, auf im...
    Chapter 2007
  8. Automatic Construction of a Japanese Onomatopoeic Dictionary Using Text Data on the WWW

    As new onomatopoeic words are often created at short notice, existing dictionaries tend to have an insufficient number of their entries. Furthermore,...
    Manabu Okumura, Atsushi Okumura, Suguru Saito in Natural Language Processing and Information Systems
    Conference paper 2006
  9. Competition for funding as an indicator of research competitiveness

    Research quality is the cornerstone of modern science, it is used in the understanding of reputational differences among scientific and academic...

    Clara Eugenia Garcia, Luis Sanz-Menéndez in Scientometrics
    Article 01 August 2005
  10. Secret Hiding Using Side Match Vector Quantization

    Since side match vector quantization (SMVQ) provides better image quality of reconstructed image and compression bit rate than vector quantization...
    Chin-Chen Chang, Wei-Liang Tai, Chia-Chen Lin in Soft Computing as Transdisciplinary Science and Technology
    Conference paper 2005
  11. Installing and Deploying VMs on Enterprise Servers

    Building on your knowledge of how to physically size and prepare enterprise-class servers from previous chapters, you should now feel comfortable...
    Chapter 2005
  12. A Petri Net Model for Session Services

    In this paper, the authors propose a new type of EPr/TN net system called SYNEPr/TN (SYNchro-Extended Predicate/Transition Net), which serves as an...
    Conference paper 2002
  13. A Dynamic Marking Scheme of Assured Service for Alleviating Unfairness among Service Level Agreements

    Assured Service, which is a service model of the Internet Differentiated Services (DiffServ) architecture, is not currently well implemented on the...
    Seung-Joon Seok, Seok-Min Hong, ... Chul-Hee Kang in Management of Multimedia on the Internet
    Conference paper 2002
  14. TER: A System for Robotic Tele-echography

    The quality of ultrasound based diagnosis highly depends on the operator’s skills. Some healthcare centres may not have the required medical experts...
    Adriana Vilchis Gonzales, Philippe Cinquin, ... Serge Ippolito in Medical Image Computing and Computer-Assisted Intervention – MICCAI 2001
    Conference paper 2001
  15. Car-Parrinello Density Functional Calculations of the Bond Rupture Process of Thiolate on Gold in AFM Measurements: Progress and First Results

    Recently, direct measurements of the forces related to the rupture of a single thiolate-gold bond have been reported [1]. However, the mechanism of...
    Daniel Krüger, Roger Rousseau, ... Michele Parrinello in High Performance Computing in Science and Engineering 2000
    Conference paper 2001
  16. Computing Discrete Logarithms in Quadratic Orders

    We present efficient algorithms for computing discrete logarithms in the class group of a quadratic order and for principality testing in a real...

    Michael J. Jacobson in Journal of Cryptology
    Article 06 September 2000
  17. On Adding a Query Language to a Persistent Object System

    Object oriented programming languages as well as persistent object systems are usually accessed by explicit navigation along the relations (i.e. the...
    Markus Knasmüller in Modular Programming Languages
    Conference paper 2000
  18. Hierarchical Framework for Facial Expression Recognition

    In recent years, much work on the recognition of facial expression, and the recognition of face and the methods are various. The algorithm for...
    Ae-Kyung Yang, Hyung-Il Choi in Advances in Multimodal Interfaces — ICMI 2000
    Conference paper 2000
  19. Integrating Models of Personality and Emotions into Lifelike Characters

    A growing number of research projects in academia and industry have recently started to develop lifelike agents as a new metaphor for highly...
    Elisabeth André, Martin Klesen, ... Thomas Rist in Affective Interactions
    Chapter 2000
Did you find what you were looking for? Share feedback.