Sciweavers

70 search results - page 11 / 14
» A Note on The Rogers-Fine Identity
Sort
View
RTSS
2005
IEEE
14 years 4 months ago
Tardiness Bounds under Global EDF Scheduling on a Multiprocessor
We consider the scheduling of a sporadic real-time task system on an identical multiprocessor. Though Pfair algorithms are theoretically optimal for such task systems, in practice...
UmaMaheswari C. Devi, James H. Anderson
GECCO
2005
Springer
14 years 4 months ago
Theme preservation and the evolution of representation
The identification of mechanisms by which constraints on phenotypic variability are tuned in nature, and the implementation of these mechanisms in Evolutionary Algorithms (EAs) ca...
Keki M. Burjorjee, Jordan B. Pollack
AIS
2004
Springer
14 years 4 months ago
Integrated Term Weighting, Visualization, and User Interface Development for Bioinformation Retrieval
This project implements an integrated biological information website that classifies technical documents, learns about users' interests, and offers intuitive interactive visua...
Min Hong, Anis Kairmpour-fard, Steve Russell, Lawr...
CLEAR
2006
Springer
196views Biometrics» more  CLEAR 2006»
14 years 2 months ago
PittPatt Face Detection and Tracking for the CLEAR 2006 Evaluation
Abstract. This paper describes Pittsburgh Pattern Recognition's participation in the face detection and tracking tasks for the CLEAR 2006 evaluation. We first give a system ov...
Michael C. Nechyba, Henry Schneiderman
CCS
2008
ACM
14 years 26 days ago
Identity-based encryption with efficient revocation
Identity-based encryption (IBE) is an exciting alternative to public-key encryption, as IBE eliminates the need for a Public Key Infrastructure (PKI). Any setting, PKI- or identit...
Alexandra Boldyreva, Vipul Goyal, Virendra Kumar