Sciweavers

1717 search results - page 333 / 344
» On the analysis of the (1 1) memetic algorithm
Sort
View
IUI
2004
ACM
14 years 1 months ago
An intelligent assistant for interactive workflow composition
Complex applications in many areas, including scientific computations and business-related web services, are created from collections of components to form workflows. In many case...
Jihie Kim, Marc Spraragen, Yolanda Gil
MM
2004
ACM
178views Multimedia» more  MM 2004»
14 years 1 months ago
A bootstrapping framework for annotating and retrieving WWW images
Most current image retrieval systems and commercial search engines use mainly text annotations to index and retrieve WWW images. This research explores the use of machine learning...
HuaMin Feng, Rui Shi, Tat-Seng Chua
MOBICOM
2004
ACM
14 years 1 months ago
Power conservation and quality of surveillance in target tracking sensor networks
Target tracking is an important application of wireless sensor networks. In this application, the sensor nodes collectively monitor and track the movement of an event or target ob...
Chao Gui, Prasant Mohapatra
PODC
2004
ACM
14 years 1 months ago
Gradient clock synchronization
We introduce the distributed gradient clock synchronization problem. As in traditional distributed clock synchronization, we consider a network of nodes equipped with hardware clo...
Rui Fan, Nancy A. Lynch
CRYPTO
2004
Springer
128views Cryptology» more  CRYPTO 2004»
14 years 1 months ago
Faster Correlation Attack on Bluetooth Keystream Generator E0
We study both distinguishing and key-recovery attacks against E0, the keystream generator used in Bluetooth by means of correlation. First, a powerful computation method of correla...
Yi Lu 0002, Serge Vaudenay