Sciweavers

716 search results - page 85 / 144
» Rule Formats for Timed Processes
Sort
View
CMPB
2007
113views more  CMPB 2007»
13 years 7 months ago
Paternity analysis in Excel
Paternity analysis using microsatellite information is a well studied subject. These markers are ideal for parentage studies and fingerprinting, due to their high discrimination ...
Margarida Rocheta, F. Miguel Dionísio, Lu&i...
MOC
1998
175views more  MOC 1998»
13 years 7 months ago
Convergence of a non-stiff boundary integral method for interfacial flows with surface tension
Boundary integral methods to simulate interfacial flows are very sensitive to numerical instabilities. In addition, surface tension introduces nonlinear terms with high order spat...
Héctor D. Ceniceros, Thomas Y. Hou
INFOCOM
2009
IEEE
14 years 2 months ago
Adaptive Early Packet Filtering for Defending Firewalls Against DoS Attacks
—A major threat to data networks is based on the fact that some traffic can be expensive to classify and filter as it will undergo a longer than average list of filtering rule...
Adel El-Atawy, Ehab Al-Shaer, Tung Tran, Raouf Bou...
DIMEA
2008
138views Multimedia» more  DIMEA 2008»
13 years 9 months ago
Motion2Sound
Motion2Sound is a program that translates motion properties into sound ones. This is done by using a motion detection system(Open Cv) and one can have as an input a live web-cam o...
Aggelos Bousbouras, Antanas Kazilunas
AAAI
1998
13 years 9 months ago
Learning Investment Functions for Controlling the Utility of Control Knowledge
The utility problem occurs when the cost of the acquired knowledge outweighs its bene ts. When the learner acquires control knowledge for speeding up a problem solver, the bene t ...
Oleg Ledeniov, Shaul Markovitch