Sciweavers

1017 search results - page 167 / 204
» A General Model for Authenticated Data Structures
Sort
View
DATE
2008
IEEE
111views Hardware» more  DATE 2008»
14 years 3 months ago
A Formal Approach To The Protocol Converter Problem
In the absence of a single module interface standard, integration of pre-designed modules in System-on-Chip design often requires the use of protocol converters. Existing approach...
Karin Avnit, Vijay D'Silva, Arcot Sowmya, S. Rames...
GECCO
2007
Springer
300views Optimization» more  GECCO 2007»
14 years 2 months ago
A NSGA-II, web-enabled, parallel optimization framework for NLP and MINLP
Engineering design increasingly uses computer simulation models coupled with optimization algorithms to find the best design that meets the customer constraints within a time con...
David J. Powell, Joel K. Hollingsworth
FGR
2006
IEEE
284views Biometrics» more  FGR 2006»
14 years 2 months ago
A 3D Facial Expression Database For Facial Behavior Research
Traditionally, human facial expressions have been studied using either 2D static images or 2D video sequences. The 2D-based analysis is incapable of handing large pose variations....
Lijun Yin, Xiaozhou Wei, Yi Sun, Jun Wang, Matthew...
C3S2E
2009
ACM
14 years 22 days ago
The promise of solid state disks: increasing efficiency and reducing cost of DBMS processing
Most database systems (DBMSs) today are operating on servers equipped with magnetic disks. In our contribution, we want to motivate the use of two emerging and striking technologi...
Karsten Schmidt 0002, Yi Ou, Theo Härder
IMC
2007
ACM
13 years 10 months ago
Interference map for 802.11 networks
The interference map of an 802.11 network is a collection of data structures that can help heuristics for routing, channel assignment and call admission in dense wireless networks...
Dragos Niculescu