Sciweavers

7694 search results - page 1387 / 1539
» An Implementation of an Applicative File System
Sort
View
164
Voted
PR
2006
112views more  PR 2006»
15 years 3 months ago
RBF-based neurodynamic nearest neighbor classification in real pattern space
Superposition of radial basis functions centered at given prototype patterns constitutes one of the most suitable energy forms for gradient systems that perform nearest neighbor c...
Mehmet Kerem Müezzinoglu, Jacek M. Zurada
132
Voted
IJNSEC
2007
143views more  IJNSEC 2007»
15 years 3 months ago
Distributed Cryptographic Computing on Grid
Distributed cryptographic computing system plays an important role in cryptographic research since cryptographic computing is extremely computation sensitive. There are many resea...
Zhonghua Jiang, Dongdai Lin, Lin Xu, Lei Lin
144
Voted
IMCS
2007
78views more  IMCS 2007»
15 years 3 months ago
Usable set-up of runtime security policies
Setting up runtime security policies as required for firewalls or as envisioned by policy languages for the Semantic Web is a difficult task, especially for lay users who have l...
Almut Herzog, Nahid Shahmehri
119
Voted
AR
2005
115views more  AR 2005»
15 years 3 months ago
Insights toward robot-assisted evacuation
This paper discusses the application of robotic technologies to an evacuation assistance task. We describe how this kind of task differs from the more prevalent search and rescue ...
Dylan A. Shell, Maja J. Mataric
131
Voted
TMC
2008
138views more  TMC 2008»
15 years 3 months ago
A Self-Repairing Tree Topology Enabling Content-Based Routing in Mobile Ad Hoc Networks
Content-based routing (CBR) provides a powerful and flexible foundation for distributed applications. Its communication model, based on implicit addressing, fosters decoupling amon...
Luca Mottola, Gianpaolo Cugola, Gian Pietro Picco
« Prev « First page 1387 / 1539 Last » Next »