Sciweavers

970 search results - page 22 / 194
» A comprehensive analysis of hyper-heuristics
Sort
View
IACR
2011
87views more  IACR 2011»
12 years 7 months ago
Untangling RFID Privacy Models
This article investigates privacy in Radio Frequency IDentification (RFID) systems. We survey the eight most well-known RFID privacy models. We examine their advantages and drawba...
Iwen Coisel, Tania Martin
ADAEUROPE
2006
Springer
14 years 1 months ago
Bauhaus - A Tool Suite for Program Analysis and Reverse Engineering
The maintenance and evolution of critical software with high requirements for reliability is an extremely demanding, time consuming and expensive task. Errors introduced by ad-hoc ...
Aoun Raza, Gunther Vogel, Erhard Plödereder
TSMC
2010
13 years 2 months ago
Advances in View-Invariant Human Motion Analysis: A Review
Abstract--As viewpoint issue is becoming a bottleneck for human motion analysis and its application, in recent years, researchers have been devoted to view-invariant human motion a...
Xiaofei Ji, Honghai Liu
MR
2002
100views Robotics» more  MR 2002»
13 years 7 months ago
No-flow underfill flip chip assembly--an experimental and modeling analysis
In the flip-chip assembly process, no-flow underfill materials have a particular advantage over traditional underfill: the application and curing of the former can be undertaken b...
Hua Lu 0003, K. C. Hung, Stoyan Stoyanov, Chris Ba...
CLOUDCOM
2010
Springer
13 years 5 months ago
Performance Analysis of High Performance Computing Applications on the Amazon Web Services Cloud
Cloud computing has seen tremendous growth, particularly for commercial web applications. The on-demand, pay-as-you-go model creates a flexible and cost-effective means to access c...
Keith R. Jackson, Lavanya Ramakrishnan, Krishna Mu...