Sciweavers

2006 search results - page 367 / 402
» Heuristic Security-Testing Methods
Sort
View
ICDE
2006
IEEE
159views Database» more  ICDE 2006»
14 years 3 months ago
Replication Based on Objects Load under a Content Distribution Network
Users tend to use the Internet for “resource-hungry” applications (which involve content such as video, audio on-demand and distributed data) and at the same time, more and mo...
George Pallis, Konstantinos Stamos, Athena Vakali,...
IROS
2006
IEEE
107views Robotics» more  IROS 2006»
14 years 3 months ago
Learning Sensory-Motor Maps for Redundant Robots
— Humanoid robots are routinely engaged in tasks requiring the coordination between multiple degrees of freedom and sensory inputs, often achieved through the use of sensorymotor...
Manuel Lopes, José Santos-Victor
QSHINE
2005
IEEE
14 years 2 months ago
Retransmission Strategies for Wireless Connections with Resource-Limited Devices
Protocols designed to provide error-free communications over lossy links, at both data link and transport layers, commonly employ the idea of sliding windows, which is based on th...
Lavy Libman
VISUALIZATION
2005
IEEE
14 years 2 months ago
Topology-driven Surface Mappings with Robust Feature Alignment
Topological concepts and techniques have been broadly applied in computer graphics and geometric modeling. However, the homotopy type of a mapping between two surfaces has not bee...
Christopher Carner, Miao Jin, Xianfeng Gu, Hong Qi...
GECCO
2005
Springer
140views Optimization» more  GECCO 2005»
14 years 2 months ago
Intransitivity revisited coevolutionary dynamics of numbers games
Relative fitness, or “evaluation by tests” is one of the building blocks of coevolution: the only fitness information available is a comparison with other individuals in a p...
Pablo Funes, Enrique Pujals