Sciweavers

858 search results - page 21 / 172
» One Is Enough!
Sort
View
ICRA
2000
IEEE
88views Robotics» more  ICRA 2000»
14 years 1 months ago
Incremental Optimization of Cyclic Timed Event Graphs
In this paper we deal with the problem of allocating a given number of tokens, so as to maximize the firing rate of a cyclic event graph with deterministic transition firing delay...
Alessandro Giua, Aldo Piccaluga, Carla Seatzu
ICTAI
2009
IEEE
13 years 6 months ago
A Confidence-Based Dominance Operator in Evolutionary Algorithms for Noisy Multiobjective Optimization Problems
This paper describes a noise-aware dominance operator for evolutionary algorithms to solve the multiobjective optimization problems (MOPs) that contain noise in their objective fu...
Pruet Boonma, Junichi Suzuki
FSE
2007
Springer
142views Cryptology» more  FSE 2007»
14 years 21 days ago
A New Class of Weak Keys for Blowfish
The reflection attack is a recently discovered self similarity analysis which is usually mounted on ciphers with many fixed points. In this paper, we describe two reflection attack...
Orhun Kara, Cevat Manap
TOG
2008
120views more  TOG 2008»
13 years 8 months ago
Real-time, all-frequency shadows in dynamic scenes
Shadow computation in dynamic scenes under complex illumination is a challenging problem. Methods based on precomputation provide accurate, real-time solutions, but are hard to ex...
Thomas Annen, Zhao Dong, Tom Mertens, Philippe Bek...
NETWORKING
2004
13 years 10 months ago
Comparative Evaluation of Two Scalable QoS Architectures
This paper performs a comparative evaluation of two QoS architectures, RSVP Reservation Aggregation and Scalable ReservationBased QoS, aimed at providing QoS levels similar to the ...
Rui Prior, Susana Sargento, Pedro Brandão, ...