Sciweavers

181 search results - page 28 / 37
» Darwin's solution to the species problem
Sort
View
FMSD
2007
133views more  FMSD 2007»
13 years 7 months ago
Static priority scheduling of event-triggered real-time embedded systems
Real-time embedded systems are often specified as a collection of independent tasks, each generating a sequence of event-triggered code blocks, and the scheduling in this domain ...
Cagkan Erbas, Andy D. Pimentel, Selin Cerav-Erbas
NECO
1998
100views more  NECO 1998»
13 years 7 months ago
Memory Maintenance via Neuronal Regulation
Since their conception half a century ago Hebbian cell assemblies have become a basic term in the Neurosciences, and the idea that learning takes place through synaptic modi catio...
David Horn, Nir Levy, Eytan Ruppin
TIP
1998
134views more  TIP 1998»
13 years 7 months ago
Region growing: a new approach
Accurate segmentation of images is one of the most important objectives in image analysis. The two conventional methods of image segmentation, region based segmentation and bounda...
S. A. Hojjatoleslami, Josef Kittler
CISC
2005
Springer
169views Cryptology» more  CISC 2005»
14 years 1 months ago
On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography
Abstract. Despite many good (secure) key agreement protocols based on publickey cryptography exist, secure associations between two wireless devices are often established using sym...
Serge Vaudenay
TC
1998
13 years 7 months ago
Algorithms for Variable Length Subnet Address Assignment
In a computer network that consists of M subnetworks, the L-bit address of a machine consists of two parts: A pre x si that contains the address of the subnetwork to which the mac...
Mikhail J. Atallah, Douglas Comer