Sciweavers

14850 search results - page 2845 / 2970
» A Geometric Approach to Betweenness
Sort
View
CP
2004
Springer
15 years 7 months ago
ID Walk: A Candidate List Strategy with a Simple Diversification Device
This paper presents a new optimization metaheuristic called ID Walk (Intensification/Diversification Walk) that offers advantages for combining simplicity with effectiveness. In ad...
Bertrand Neveu, Gilles Trombettoni, Fred Glover
BPM
2006
Springer
113views Business» more  BPM 2006»
15 years 7 months ago
Process Equivalence: Comparing Two Process Models Based on Observed Behavior
In various application domains there is a desire to compare process models, e.g., to relate an organization-specific process model to a reference model, to find a web service match...
Wil M. P. van der Aalst, Ana Karla A. de Medeiros,...
CBSE
2006
Springer
15 years 7 months ago
Generic Component Lookup
The possibilities currently offered to conduct business at an electronic level are immense. Service providers offer access to their attendances through components placed on the Int...
Till G. Bay, Patrick Th. Eugster, Manuel Oriol
DSRT
2004
IEEE
15 years 7 months ago
Exploring the Spatial Density of Strategy Models in a Realistic Distributed Interactive Application
As Distributed Interactive Applications (DIAs) become increasingly more prominent in the video game industry they must scale to accommodate progressively more users and maintain a...
Damien Marshall, Declan Delaney, Séamus McL...
CHES
2006
Springer
81views Cryptology» more  CHES 2006»
15 years 7 months ago
Template Attacks in Principal Subspaces
Side-channel attacks are a serious threat to implementations of cryptographic algorithms. Secret information is recovered based on power consumption, electromagnetic emanations or ...
Cédric Archambeau, Eric Peeters, Fran&ccedi...
« Prev « First page 2845 / 2970 Last » Next »