Sciweavers

7984 search results - page 1561 / 1597
» Exploring personal information
Sort
View
ECAL
2001
Springer
14 years 3 days ago
Evolving Lives: The Individual Historical Dimension in Evolution
Some benefits of a dialogue between evolutionary robotics and developmental ethology are presented with discussion of how developmental models might inform approaches to evolution...
Rachel Wood
DEXAW
2000
IEEE
160views Database» more  DEXAW 2000»
14 years 16 hour ago
An Adaptive AVI-Based Cache Invalidation Scheme for Mobile Computing Systems
In a mobile computing system, caching data items at the mobile clients is important to reduce the data access delay in a unreliable and low bandwidth mobile network. However, effi...
Joe Chun-Hung Yuen, Edward Chan, Kam-yiu Lam, Hei-...
ASPLOS
2000
ACM
13 years 12 months ago
Architectural Support for Fast Symmetric-Key Cryptography
The emergence of the Internet as a trusted medium for commerce and communication has made cryptography an essential component of modern information systems. Cryptography provides ...
Jerome Burke, John McDonald, Todd M. Austin
FOCS
1999
IEEE
13 years 12 months ago
Near-Optimal Conversion of Hardness into Pseudo-Randomness
Various efforts ([?, ?, ?]) have been made in recent years to derandomize probabilistic algorithms using the complexity theoretic assumption that there exists a problem in E = dti...
Russell Impagliazzo, Ronen Shaltiel, Avi Wigderson
SMA
1999
ACM
107views Solid Modeling» more  SMA 1999»
13 years 12 months ago
Generation of swept volumes of toroidal endmills in five-axis motion using space curves
Accurate prediction of the swept volume of a cutting tool is essential in NC verification algorithms for detecting deficiencies in a proposed tool path, such as gouging, undercutt...
David Roth, Sanjeev Bedi, Fathy Ismail
« Prev « First page 1561 / 1597 Last » Next »