Sciweavers

5766 search results - page 1050 / 1154
» Reverse Engineering of Data
Sort
View
EWC
2010
91views more  EWC 2010»
15 years 2 months ago
Multiobjective global surrogate modeling, dealing with the 5-percent problem
When dealing with computationally expensive simulation codes or process measurement data, surrogate modeling methods are firmly established as facilitators for design space explor...
Dirk Gorissen, Ivo Couckuyt, Eric Laermans, Tom Dh...
IEICET
2010
76views more  IEICET 2010»
15 years 2 months ago
Planar Waveguide Arrays for Millimeter Wave Systems
Design of high gain and high efficiency antennas is one of the key challenges in antenna engineering and especially in millimeter wave communication systems. Various types of plan...
Makoto Ando
MTA
2010
101views more  MTA 2010»
15 years 2 months ago
Enquiring MPEG-7 based multimedia ontologies
Machine understandable metadata forms the main prerequisite for the intelligent services envisaged in a Web, which going beyond mere data exchange and provides for effective conten...
Stamatia Dasiopoulou, Vassilis Tzouvaras, Ioannis ...
OOPSLA
2010
Springer
15 years 2 months ago
From OO to FPGA: fitting round objects into square hardware?
Consumer electronics today such as cell phones often have one or more low-power FPGAs to assist with energyintensive operations in order to reduce overall energy consumption and i...
Stephen Kou, Jens Palsberg
SACMAT
2010
ACM
15 years 2 months ago
Role mining based on weights
Role mining from the existing permissions has been widely applied to aid the process of migrating to an RBAC system. While all permissions are treated evenly in previous approache...
Xiaopu Ma, Ruixuan Li, Zhengding Lu
« Prev « First page 1050 / 1154 Last » Next »