Sciweavers

6274 search results - page 1087 / 1255
» Proofs, Programs, Processes
Sort
View
GECCO
2005
Springer
151views Optimization» more  GECCO 2005»
14 years 4 months ago
The application of antigenic search techniques to time series forecasting
Time series have been a major topic of interest and analysis for hundreds of years, with forecasting a central problem. A large body of analysis techniques has been developed, par...
Ian Nunn, Tony White
HVC
2005
Springer
97views Hardware» more  HVC 2005»
14 years 4 months ago
An Extensible Open-Source Compiler Infrastructure for Testing
Testing forms a critical part of the development process for large-scale software, and there is growing need for automated tools that can read, represent, analyze, and transform th...
Daniel J. Quinlan, Shmuel Ur, Richard W. Vuduc
ICAPR
2005
Springer
14 years 4 months ago
Unsupervised Markovian Segmentation on Graphics Hardware
Abstract. This contribution shows how unsupervised Markovian segmentation techniques can be accelerated when implemented on graphics hardware equipped with a Graphics Processing Un...
Pierre-Marc Jodoin, Jean-François St-Amour,...
ICCS
2005
Springer
14 years 4 months ago
A Computational Model of Micro-vascular Growth
In order to supply a growing tissue with oxygen and nutrients and to remove its metabolic wastes, blood vessels penetrating the tissue are formed. Multiple mechanisms are involved ...
Dominik Szczerba, Gábor Székely
IFIP
2005
Springer
14 years 4 months ago
Type-Based Distributed Access Control vs. Untyped Attackers
This paper considers the effect of untyped attackers inside a distributed system where security is enforced by the type system. In previous work we introduced the Key-Based Decentr...
Tom Chothia, Dominic Duggan
« Prev « First page 1087 / 1255 Last » Next »