Sciweavers

1421 search results - page 62 / 285
» The First and Second Max-SAT Evaluations
Sort
View
CEC
2005
IEEE
14 years 1 months ago
Finding attack strategies for predator swarms using genetic algorithms
Abstract- Behavior based architectures have many parameters that must be tuned to produce effective and believable agents. We use genetic algorithms to tune simple behavior based c...
Ryan E. Leigh, Tony Morelli, Sushil J. Louis, Moni...
HAPTICS
2005
IEEE
14 years 1 months ago
Bi-Level and Anti-Aliased Rendering Methods for a Low-Resolution 2D Vibrotactile Array
We investigate rendering methods for 2D tactile arrays. We present four rendering methods, two of which are anti-aliased methods to improve display quality and smoothness. We desc...
Christoph W. Borst, Alp V. Asutay
ICECCS
2005
IEEE
154views Hardware» more  ICECCS 2005»
14 years 1 months ago
Customizable Framework for Managing Trusted Components Deployed on Middleware
Due to the widespread trust threat under the open and dynamic Internet environment, the computer community has endeavored to engage in the studies of technologies for protecting a...
Minghui Zhou, Wenpin Jiao, Hong Mei
ITCC
2005
IEEE
14 years 1 months ago
Research on DRM-Enabled Learning Objects Model
The paper mainly discusses the DRM-enabled learning object model. Firstly, it analyses the art-of-status of Intellectual Property Rights in e-learning. Secondly, according to appl...
Qingtang Liu, Zongkai Yang, Kun Yan, Jing Jin, Wan...
IWPC
2005
IEEE
14 years 1 months ago
Clustering Software Artifacts Based on Frequent Common Changes
Changes of software systems are less expensive and less error-prone if they affect only one subsystem. Thus, clusters of artifacts that are frequently changed together are subsyst...
Dirk Beyer, Andreas Noack