Sciweavers

27692 search results - page 190 / 5539
» Where is ...
Sort
View
FSTTCS
2007
Springer
14 years 4 months ago
Safely Composing Security Protocols
Security protocols are small programs that are executed in hostile environments. Many results and tools have been developed to formally analyze the security of a protocol. However ...
Véronique Cortier, Jérémie De...
GECCO
2007
Springer
176views Optimization» more  GECCO 2007»
14 years 4 months ago
Best SubTree genetic programming
The result of the program encoded into a Genetic Programming (GP) tree is usually returned by the root of that tree. However, this is not a general strategy. In this paper we pres...
Oana Muntean, Laura Diosan, Mihai Oltean
GI
2007
Springer
14 years 4 months ago
On Sensor Scheduling in Case of Unreliable Communication
: This paper deals with the linear discrete-time sensor scheduling problem in unreliable communication networks. In case of the common assumption of an errorfree communication, the...
Marco F. Huber, Eric Stiegeler, Uwe D. Hanebeck
GRID
2007
Springer
14 years 4 months ago
An ActOn-based semantic information service for EGEE
— We describe an information service that aggregates metadata available in hundreds of information sources of the EGEE Grid infrastructure. It uses an ontology-based information ...
Wei Xing, Óscar Corcho, Carole A. Goble, Ma...
IBPRIA
2007
Springer
14 years 4 months ago
Vehicle Trajectory Estimation Based on Monocular Vision
This paper proposes a system to estimate the 3D position and velocity of vehicles, from images acquired with a monocular camera. Given image regions where vehicles are detected, Ga...
Daniel Ponsa, Antonio M. López