Sciweavers

318 search results - page 41 / 64
» Application Areas of AIS: The Past, The Present and The Futu...
Sort
View
CMS
2001
119views Communications» more  CMS 2001»
13 years 9 months ago
Vulnerabilities and Security Limitations of current IP Telephony Systems
Abstract Within the traditional telephone system a certain level of quality and security has been established over the years. If we try to use IP Telephony systems as a core part o...
Ralf Ackermann, Markus Schumacher, Utz Roedig, Ral...
APSEC
2008
IEEE
14 years 2 months ago
Domain Specific Engineering Environments
Computer Aided Software Engineering tools represent one the main successes of software engineering in the past decades. They however need to be improved along several dimensions i...
Jacky Estublier, Germán Vega, Philippe Lala...
JTAER
2007
78views more  JTAER 2007»
13 years 7 months ago
A System for Locating Mobile Terminals with Tunable Privacy
A number of approaches for capturing and processing location information of mobile users have been proposed in the past; however, only with the latest advances in the handset tech...
Sandford Bessler
DATE
2004
IEEE
175views Hardware» more  DATE 2004»
13 years 11 months ago
Breaking Instance-Independent Symmetries in Exact Graph Coloring
Code optimization and high level synthesis can be posed as constraint satisfaction and optimization problems, such as graph coloring used in register allocation. Graph coloring is...
Arathi Ramani, Fadi A. Aloul, Igor L. Markov, Kare...
AC
1998
Springer
13 years 7 months ago
Cellular Automata Models of Self-Replicating Systems
Abstract: Since von Neumann's seminal work around 1950, computer scientists and others have studied the algorithms needed to support self-replicating systems. Much of this wor...
James A. Reggia, Hui-Hsien Chou, Jason D. Lohn