Sciweavers

1466 search results - page 213 / 294
» Completeness of the Authentication Tests
Sort
View
IOLTS
2002
IEEE
127views Hardware» more  IOLTS 2002»
14 years 23 days ago
Fault Tolerance Evaluation Using Two Software Based Fault Injection Methods
A silicon independent C-Based model of the TTP/C protocol was implemented within the EU-founded project FIT. The C-based model is integrated in the C-Sim simulation environment. T...
Astrit Ademaj, Petr Grillinger, Pavel Herout, Jan ...
CPAIOR
2010
Springer
14 years 20 days ago
A Constraint Integer Programming Approach for Resource-Constrained Project Scheduling
Abstract. We propose a hybrid approach for solving the resource-constrained project scheduling problem which is an extremely hard to solve combinatorial optimization problem of pra...
Timo Berthold, Stefan Heinz, Marco E. Lübbeck...
SAC
2009
ACM
14 years 15 days ago
Incremental board: a grid-based space for visualizing dynamic data sets
In Information Visualization, adding and removing data elements can strongly impact the underlying visual space. We introduce a chess board analogy for displaying (projecting) obj...
Roberto Pinho, Maria Cristina Ferreira de Oliveira...
GECCO
2009
Springer
119views Optimization» more  GECCO 2009»
14 years 14 days ago
Cooperative micro-differential evolution for high-dimensional problems
High–dimensional optimization problems appear very often in demanding applications. Although evolutionary algorithms constitute a valuable tool for solving such problems, their ...
Konstantinos E. Parsopoulos
EMMCVPR
2001
Springer
14 years 10 days ago
A Hierarchical Markov Random Field Model for Figure-Ground Segregation
To segregate overlapping objects into depth layers requires the integration of local occlusion cues distributed over the entire image into a global percept. We propose to model thi...
Stella X. Yu, Tai Sing Lee, Takeo Kanade