Sciweavers

4163 search results - page 691 / 833
» Enhancing surgical systems
Sort
View
GECCO
2008
Springer
108views Optimization» more  GECCO 2008»
13 years 10 months ago
Search space reduction technique for constrained optimization with tiny feasible space
The hurdles in solving Constrained Optimization Problems (COP) arise from the challenge of searching a huge variable space in order to locate feasible points with acceptable solut...
Abu S. S. M. Barkat Ullah, Ruhul A. Sarker, David ...
ICMCS
2010
IEEE
210views Multimedia» more  ICMCS 2010»
13 years 10 months ago
A framework for extracting musical similarities from peer-to-peer networks
The usage of peer-to-peer (p2p) networks for music information retrieval (MIR) tasks is gaining momentum. P2P file sharing networks can be used for collecting both search queries ...
Noam Koenigstein, Yuval Shavitt, Tomer Tankel, Ela...
CCS
2010
ACM
13 years 9 months ago
An empirical study of privacy-violating information flows in JavaScript web applications
The dynamic nature of JavaScript web applications has given rise to the possibility of privacy violating information flows. We present an empirical study of the prevalence of such...
Dongseok Jang, Ranjit Jhala, Sorin Lerner, Hovav S...
ACTA
2010
87views more  ACTA 2010»
13 years 9 months ago
On the observational theory of the CPS-calculus
We study the observational theory of Thielecke's CPS-calculus, a distillation of the target language of Continuation-Passing Style transforms. We define a labelled transition...
Massimo Merro
ADHOC
2007
104views more  ADHOC 2007»
13 years 9 months ago
An overlay approach to data security in ad-hoc networks
While it has been argued that application-layer overlay protocols can enhance services in mobile ad-hoc networks, hardly any empirical data is available on the throughput and dela...
Jörg Liebeherr, Guangyu Dong