Sciweavers

3943 search results - page 694 / 789
» Architecture-Level Requirements Specification
Sort
View
CEAS
2005
Springer
15 years 9 months ago
Searching For John Doe: Finding Spammers and Phishers
Microsoft has prosecuted a vigorous civil enforcement campaign against spammers and phishers. When initial investigation into a spam or phishing case fails to reveal the identity ...
Aaron E. Kornblum
EMSOFT
2005
Springer
15 years 9 months ago
Deeply embedded XML communication: towards an interoperable and seamless world
Current consumer electronics devices do not interoperate and are hard to use. Devices use proprietary, device-specific and inflexible protocols. Resources across device classes, s...
Johannes Helander
116
Voted
FPGA
2005
ACM
97views FPGA» more  FPGA 2005»
15 years 9 months ago
Techniques for synthesizing binaries to an advanced register/memory structure
Recent works demonstrate several benefits of synthesizing software binaries onto FPGA hardware, including incorporating hardware design into established software tool flows with m...
Greg Stitt, Zhi Guo, Walid A. Najjar, Frank Vahid
GECCO
2005
Springer
133views Optimization» more  GECCO 2005»
15 years 9 months ago
Heuristic rules embedded genetic algorithm to solve in-core fuel management optimization problem
Because of the large number of possible combinations for the fuel assembly loading in the core, the design of the loading pattern (LP) is a complex optimization problem. It requir...
Fatih Alim, Kostadin Ivanov
GECCO
2005
Springer
156views Optimization» more  GECCO 2005»
15 years 9 months ago
Parameterized versus generative representations in structural design: an empirical comparison
Any computational approach to design, including the use of evolutionary algorithms, requires the transformation of the domain-specific knowledge into a formal design representatio...
Rafal Kicinger, Tomasz Arciszewski, Kenneth A. De ...