Sciweavers

2015 search results - page 347 / 403
» Hidden Software Capabilities
Sort
View
AES
2005
Springer
81views Cryptology» more  AES 2005»
13 years 7 months ago
Optimum design of an interbody implant for lumbar spine fixation
A new minimally invasive surgical technique for lumbar spine fixation is currently in development. The procedure makes use of an interbody implant that is inserted between two ver...
Andrés Tovar, Shawn E. Gano, James J. Mason...
INFSOF
2007
104views more  INFSOF 2007»
13 years 7 months ago
A state-based approach to integration testing based on UML models
: Correct functioning of object-oriented software depends upon the successful integration of classes. While individual classes may function correctly, several new faults can arise ...
Shaukat Ali, Lionel C. Briand, Muhammad Jaffar-Ur ...
JCM
2007
76views more  JCM 2007»
13 years 7 months ago
Scheduling Small Packets in IPSec Multi-accelerator Based Systems
—IPSec is a suite of protocols that adds security to communications at the IP level. Protocols within the IPSec suite make extensive use of cryptographic algorithms. Since these ...
Antonio Vincenzo Taddeo, Alberto Ferrante, Vincenz...
ECRA
2002
129views more  ECRA 2002»
13 years 7 months ago
A formal approach to negotiating agents development
This paper presents a formal and executable approach to capture the behaviour of parties involved in a negotiation. A party is modeled as a negotiating agent composed of a communi...
Marlon Dumas, Guido Governatori, Arthur H. M. ter ...
ML
2000
ACM
244views Machine Learning» more  ML 2000»
13 years 7 months ago
Learnable Evolution Model: Evolutionary Processes Guided by Machine Learning
A new class of evolutionary computation processes is presented, called Learnable Evolution Model or LEM. In contrast to Darwinian-type evolution that relies on mutation, recombinat...
Ryszard S. Michalski