Sciweavers

2421 search results - page 471 / 485
» Approximate Flow-Aware Networking
Sort
View
GECCO
2009
Springer
138views Optimization» more  GECCO 2009»
14 years 2 months ago
IMAD: in-execution malware analysis and detection
The sophistication of computer malware is becoming a serious threat to the information technology infrastructure, which is the backbone of modern e-commerce systems. We, therefore...
Syed Bilal Mehdi, Ajay Kumar Tanwani, Muddassar Fa...
IWANN
2009
Springer
14 years 2 months ago
Fuzzy Logic, Soft Computing, and Applications
We survey on the theoretical and practical developments of the theory of fuzzy logic and soft computing. Specifically, we briefly review the history and main milestones of fuzzy ...
Inma P. Cabrera, Pablo Cordero, Manuel Ojeda-Acieg...
UC
2009
Springer
14 years 2 months ago
Brain Dynamics Promotes Function
Abstract. Dynamical structure in the brain promotes biological function. Natural scientists look for correlations between measured electrical signals and behavior or mental states....
Carlos Lourenço
LANC
2009
ACM
158views Education» more  LANC 2009»
14 years 2 months ago
Enhancements to the opinion model for video-telephony applications
In this paper, we show how the proposed model in ITU-T Recommendation G.1070 “Opinion model for video-telephony applications” cannot model properly the perceptual video qualit...
Jose Joskowicz, José Carlos López-Ar...
CDC
2008
IEEE
132views Control Systems» more  CDC 2008»
14 years 2 months ago
A distributed auction algorithm for the assignment problem
— The assignment problem constitutes one of the fundamental problems in the context of linear programming. Besides its theoretical significance, its frequent appearance in the a...
Michael M. Zavlanos, Leonid Spesivtsev, George J. ...