Sciweavers

6931 search results - page 1328 / 1387
» Visual Simulation Environment
Sort
View
PLDI
2009
ACM
14 years 3 months ago
A weakest precondition approach to active attacks analysis
Information flow controls can be used to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted envi...
Musard Balliu, Isabella Mastroeni
SAC
2009
ACM
14 years 3 months ago
Diverse peer selection in collaborative web search
Effective peer selection for intelligent query routing is a challenge in collaborative peer-based Web search systems, especially unstructured networks that do not have any central...
Le-Shin Wu, Filippo Menczer
CCGRID
2009
IEEE
14 years 3 months ago
BLAST Application with Data-Aware Desktop Grid Middleware
—There exists numerous Grid middleware to develop and execute programs on the computational Grid, but they still require intensive work from their users. BitDew is made to facili...
Haiwu He, Gilles Fedak, Bing Tang, Franck Cappello
CEC
2009
IEEE
14 years 3 months ago
Evolving morphology and control: A distributed approach
—In this paper we present a model which allows to co-evolve the morphology and the control system of realistically simulated robots (creatures). The method proposed is based on a...
Mariagiovanna Mazzapioda, Angelo Cangelosi, Stefan...
CSE
2009
IEEE
14 years 3 months ago
On the Design of a Suitable Hardware Platform for Protocol Stack Processing in LTE Terminals
—In this paper we present a design methodology for the identification and development of a suitable hardware platform (including dedicated hardware accelerators) for the data pl...
Sebastian Hessel, David Szczesny, Shadi Traboulsi,...
« Prev « First page 1328 / 1387 Last » Next »