Sciweavers

351 search results - page 55 / 71
» Staged Configuration Using Feature Models
Sort
View
INFSOF
2000
98views more  INFSOF 2000»
13 years 7 months ago
Performance comparison of CORBA and RMI
Distributed object architectures and Java are important for building modern, scalable, web-enabled applications. This paper is focused on qualitative and quantitative comparison o...
Matjaz B. Juric, Ivan Rozman, Marjan Hericko
EC
2010
157views ECommerce» more  EC 2010»
13 years 7 months ago
Memetic Algorithms for Continuous Optimisation Based on Local Search Chains
Memetic algorithms with continuous local search methods have arisen as effective tools to address the difficulty of obtaining reliable solutions of high precision for complex cont...
Daniel Molina, Manuel Lozano, Carlos García...
CSFW
1999
IEEE
13 years 12 months ago
Athena: A New Efficient Automatic Checker for Security Protocol Analysis
We propose an efficient automatic checking algorithm, Athena, for analyzing security protocols. Athena incorporates a logic that can express security properties including authenti...
Dawn Xiaodong Song
WSC
2000
13 years 9 months ago
Circumstance descriptors: a method for generating plan modifications and fragmentary orders
Circumstance Descriptors are offered as a way to organize spatial and other military knowledge that may be difficult to formulate, particularly the kinds of details that are most ...
John B. Gilmer Jr.
PR
2008
113views more  PR 2008»
13 years 7 months ago
Heart sound as a biometric
In this paper, we investigate the possibility of using heart sound as a biometric for human identification. The most significant contribution of using heart sound as a biometric is...
Koksoon Phua, Jianfeng Chen, Tran Huy Dat, Louis S...