Sciweavers

2867 search results - page 556 / 574
» On Interactive Evolution Strategies
Sort
View
MABS
2004
Springer
14 years 1 months ago
Formal Analysis of Meeting Protocols
Organizations depend on regular meetings to carry out their everyday tasks. When carried out successfully, meetings offer a common medium for participants to exchange ideas and mak...
Catholijn M. Jonker, Martijn C. Schut, Jan Treur, ...
RT
2004
Springer
14 years 1 months ago
PointWorks: Abstraction and Rendering of Sparsely Scanned Outdoor Environments
ks: Abstraction and Rendering of Sparsely Scanned Outdoor Environments Hui Xu, Nathan Gossett and Baoquan Chen University of Minnesota Digital Technology Center at Twin Cities † ...
Hui Xu, Nathan Gossett, Baoquan Chen
CSFW
2003
IEEE
14 years 1 months ago
A Procedure for Verifying Security Against Type Confusion Attacks
A type confusion attack is one in which a principal accepts data of one type as data of another. Although it has been shown by Heather et al. that there are simple formatting conv...
Catherine Meadows
HICSS
2003
IEEE
112views Biometrics» more  HICSS 2003»
14 years 29 days ago
Creating a Scenariologic - Design and Application of a Repeatable Methodology
Context scenarios are widely used for assessing the robustness of strategies and policies in both the private and the public sector. Royal Dutch Shell, for instance, has become re...
Bert Enserink
VISUALIZATION
2003
IEEE
14 years 29 days ago
Visualizing Industrial CT Volume Data for Nondestructive Testing Applications
This paper describes a set of techniques developed for the visualization of high-resolution volume data generated from industrial computed tomography for nondestructive testing (N...
Runzhen Huang, Kwan-Liu Ma, Patrick S. McCormick, ...