Sciweavers

1265 search results - page 49 / 253
» Finding the Key to a Synapse
Sort
View
INFORMATICALT
2006
110views more  INFORMATICALT 2006»
13 years 9 months ago
Iterated Tabu Search for the Unconstrained Binary Quadratic Optimization Problem
Given a set of objects with profits (any, even negative, numbers) assigned not only to separate objects but also to pairs of them, the unconstrained binary quadratic optimization p...
Gintaras Palubeckis
JUCS
2008
240views more  JUCS 2008»
13 years 9 months ago
UCL-GLORP - An ORM for Common Lisp
: UCL-GLORP is a Common Lisp implementation and extension of GLORP (Generic Lightweight Object-Relational Persistence), an Object-Relational Mapper for the Smalltalk language. UCL-...
António Menezes Leitão
JERIC
2006
68views more  JERIC 2006»
13 years 9 months ago
Teaching context in information security
: This paper discusses teaching the application of technical idea through non-technical discussions, especially the use of puzzles to engage students. After discussing the need for...
Matt Bishop
AMC
2005
116views more  AMC 2005»
13 years 8 months ago
The design of integrating subliminal channel with access control
Recently, Lee and Yang proposed a subliminal scheme which employs an access control in a hierarchy. In their scheme, chief users use a one-way hash function to compute their subord...
Narn-Yih Lee, Shu-Ya Yang
AI
2002
Springer
13 years 8 months ago
On the relationship between model-based debugging and program slicing
Program slicing is a general, widely-used, and accepted technique applicable to different software engineering tasks including debugging, whereas model-based diagnosis is an AI te...
Franz Wotawa