Sciweavers

15614 search results - page 3018 / 3123
» The State of State
Sort
View
JUCS
2008
113views more  JUCS 2008»
15 years 4 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
JEI
2006
246views more  JEI 2006»
15 years 4 months ago
Fuzzy logic recursive motion detection and denoising of video sequences
We propose a fuzzy logic recursive scheme for motion detection and spatiotemporal filtering that can deal with the Gaussian noise and unsteady illumination conditions in both the t...
Vladimir Zlokolica, Aleksandra Pizurica, Wilfried ...
EC
2007
160views ECommerce» more  EC 2007»
15 years 4 months ago
Agent-Based Model of Genotype Editing
Evolutionary algorithms rarely deal with ontogenetic, non-inherited alteration of genetic information because they are based on a direct genotype-phenotype mapping. In contrast, i...
Chien-Feng Huang, Jasleen Kaur, Ana Gabriela Magui...
KER
2008
107views more  KER 2008»
15 years 4 months ago
Tuplespace-based computing for the Semantic Web: a survey of the state-of-the-art
Semantic technologies promise to solve many challenging problems of the present Web applications. As they achieve a feasible level of maturity, they become increasingly accepted i...
Lyndon J. B. Nixon, Elena Paslaru Bontas Simperl, ...
JSA
2006
97views more  JSA 2006»
15 years 4 months ago
Dynamic feature selection for hardware prediction
It is often possible to greatly improve the performance of a hardware system via the use of predictive (speculative) techniques. For example, the performance of out-of-order micro...
Alan Fern, Robert Givan, Babak Falsafi, T. N. Vija...
« Prev « First page 3018 / 3123 Last » Next »