Sciweavers

475 search results - page 86 / 95
» On Some Performance Indices for Biometric Identification Sys...
Sort
View
AP2PS
2009
IEEE
14 years 3 months ago
Detection of Encrypted Traffic in eDonkey Network through Application Signatures
—Peer-to-peer file sharing applications became very popular, being responsible for a large percentage of the network traffic. However, peer-to-peer traffic may compromise the per...
Mário M. Freire, David A. Carvalho, Manuela...
CHI
2008
ACM
14 years 9 months ago
Evaluating motion constraints for 3D wayfinding in immersive and desktop virtual environments
Motion constraints providing guidance for 3D navigation have recently been suggested as a way of offloading some of the cognitive effort of traversing complex 3D environments on a...
Niklas Elmqvist, Mihail Eduard Tudoreanu, Philippa...
GECCO
2007
Springer
173views Optimization» more  GECCO 2007»
14 years 2 months ago
A hybrid GA for a supply chain production planning problem
The problem of production and delivery lot-sizing and scheduling of set of items in a two-echelon supply chain over a finite planning horizon is addressed in this paper. A single ...
Masoud Jenabi, S. Ali Torabi, S. Afshin Mansouri
PPAM
2007
Springer
14 years 2 months ago
A Supernodal Out-of-Core Sparse Gaussian-Elimination Method
Abstract. We present an out-of-core sparse direct solver for unsymmetric linear systems. The solver factors the coefficient matrix A into A = PLU using Gaussian elimination with pa...
Sivan Toledo, Anatoli Uchitel
MONET
2010
187views more  MONET 2010»
13 years 7 months ago
A Proxy Mobile IPv6 Based Global Mobility Management Architecture and Protocol
This paper specifies a global mobility management architecture and protocol procedure called GPMIP, which is based on Proxy Mobile IPv6. In GPMIP, mobility management is performed ...
Huachun Zhou, Hongke Zhang, Yajuan Qin, Hwang-Chen...