Sciweavers

1154 search results - page 181 / 231
» Mathematizing C concurrency
Sort
View
FS
2006
84views more  FS 2006»
13 years 9 months ago
Iterative construction of the optimal Bermudan stopping time
Abstract. We present an iterative procedure for computing the optimal Bermudan stopping time, hence the Bermudan Snell envelope. The method produces an increasing sequence of appro...
Anastasia Kolodko, John Schoenmakers
IJSN
2008
80views more  IJSN 2008»
13 years 9 months ago
Syntax vs. semantics: competing approaches to dynamic network intrusion detection
: Malicious network traffic, including widespread worm activity, is a growing threat to Internet-connected networks and hosts. In this paper, we consider two competing approaches t...
Walter J. Scheirer, Mooi Choo Chuah
COGSCI
2007
139views more  COGSCI 2007»
13 years 9 months ago
Mapping the Color Space of Saccadic Selectivity in Visual Search
Color coding is used to guide attention in computer displays for such critical tasks as baggage screening or air traffic control. It has been shown that a display object attracts...
Yun Xu, Emily C. Higgins, Mei Xiao, Marc Pomplun
ISI
2008
Springer
13 years 9 months ago
Identity management architecture
Identity Management plays a crucial role in many application contexts, including e-governments, e-commerce, business intelligence, investigation, and homeland security. The variet...
Uwe Glässer, Mona Vajihollahi
RAS
2006
86views more  RAS 2006»
13 years 9 months ago
Using cellular automata and gradients to control self-reconfiguration
Self-reconfigurable robots are built from modules, which are autonomously able to change the way they are connected. Such a robot can, through this self-reconfiguration process, c...
Kasper Støy