Sciweavers

2290 search results - page 383 / 458
» Extensible Protected Types
Sort
View
TMC
2010
134views more  TMC 2010»
15 years 19 days ago
Enabling Efficient Peer-to-Peer Resource Sharing in Wireless Mesh Networks
—Wireless mesh networks are a promising area for the deployment of new wireless communication and networking technologies. In this paper, we address the problem of enabling effec...
Claudia Canali, Maria Elena Renda, Paolo Santi, Si...
WRLA
2010
15 years 18 days ago
The Linear Temporal Logic of Rewriting Maude Model Checker
Abstract. This paper presents the foundation, design, and implementation of the Linear Temporal Logic of Rewriting model checker as an extension of the Maude system. The Linear Tem...
Kyungmin Bae, José Meseguer
CORR
2010
Springer
427views Education» more  CORR 2010»
15 years 17 days ago
A Comparison between Memetic algorithm and Genetic algorithm for the cryptanalysis of Simplified Data Encryption Standard algori
Genetic algorithms are a population-based Meta heuristics. They have been successfully applied to many optimization problems. However, premature convergence is an inherent charact...
Poonam Garg
CVPR
2010
IEEE
15 years 8 days ago
Common visual pattern discovery via spatially coherent correspondences
We investigate how to discover all common visual patterns within two sets of feature points. Common visual patterns generally share similar local features as well as similar spati...
Hairong Liu, Shuicheng Yan
GI
2010
Springer
15 years 7 days ago
Semantics and Execution of Domain Specific Models
: paper we present a two-level approach to extend the abstract syntax of models with concrete semantics in order to execute such models. First, a light-weight execution infrastruct...
Christian Motika, Hauke Fuhrmann, Reinhard von Han...