Sciweavers

1663 search results - page 170 / 333
» Computer Security in the Real World
Sort
View
WOWMOM
2009
ACM
143views Multimedia» more  WOWMOM 2009»
15 years 10 months ago
Enhanced Ripple (E-Ripple) protocol for chain-based multihop wireless networks
It has been shown that IEEE 802.11 DCF medium access control (MAC) protocol may not be suitable for multihop wireless networks due to its relatively low throughput and severely un...
Quang Vu Nguyen, Ray-Guang Cheng
136
Voted
FDL
2008
IEEE
15 years 10 months ago
Symbolic Quasi-Static Scheduling of Actor-Oriented SystemC Models
—In this paper, we propose a quasi-static scheduling (QSS) method applicable to actor-oriented SystemC designs. QSS determines a schedule where several static schedules are combi...
Jens Gladigau, Christian Haubelt, Jürgen Teic...
GECCO
2007
Springer
154views Optimization» more  GECCO 2007»
15 years 10 months ago
Option pricing model calibration using a real-valued quantum-inspired evolutionary algorithm
Quantum effects are a natural phenomenon and just like evolution, or immune processes, can serve as an inspiration for the design of computing algorithms. This study illustrates ...
Kai Fan, Anthony Brabazon, Conall O'Sullivan, Mich...
ICCS
2007
Springer
15 years 10 months ago
AMBROSia: An Autonomous Model-Based Reactive Observing System
Observing systems facilitate scientific studies by instrumenting the real world and collecting corresponding measurements, with the aim of detecting and tracking phenomena of inte...
David Caron, Abhimanyu Das, Amit Dhariwal, Leana G...
ISVC
2007
Springer
15 years 10 months ago
A Control Architecture for Long-Term Autonomy of Robotic Assistants
A major challenge in deploying service robots into the real world is to design a framework that provides effective, long-term interactions with people. This includes interacting w...
Christopher King, Xavier Palathingal, Monica N. Ni...