Sciweavers

1532 search results - page 177 / 307
» A Comparison of RESTART Implementations
Sort
View
78
Voted
CONCURRENCY
2008
104views more  CONCURRENCY 2008»
14 years 10 months ago
PERMIS: a modular authorization infrastructure
Authorization infrastructures manage privileges and render access control decisions, allowing applications to adjust their behavior according to the privileges allocated to users....
David W. Chadwick, Gansen Zhao, Sassa Otenko, Roma...
63
Voted
CORR
2008
Springer
89views Education» more  CORR 2008»
14 years 10 months ago
Idiotypic Immune Networks in Mobile Robot Control
Jerne's idiotypic-network theory postulates that the immune response involves interantibody stimulation and suppression, as well as matching to antigens. The theory has proved...
Amanda M. Whitbrook, Uwe Aickelin, Jonathan M. Gar...
CORR
2008
Springer
149views Education» more  CORR 2008»
14 years 10 months ago
Gaussian Belief Propagation for Solving Systems of Linear Equations: Theory and Application
The canonical problem of solving a system of linear equations arises in numerous contexts in information theory, communication theory, and related fields. In this contribution, we...
Ori Shental, Danny Bickson, Paul H. Siegel, Jack K...
CORR
2006
Springer
135views Education» more  CORR 2006»
14 years 10 months ago
Constraint Functional Logic Programming over Finite Domains
In this paper, we present our proposal to Constraint Functional Logic Programming over Finite Domains (CFLP(FD) ) with a lazy functional logic programming language which seamlessl...
Antonio J. Fernández, Maria Teresa Hortal&a...
JSAC
2006
100views more  JSAC 2006»
14 years 10 months ago
Measuring and Improving the Performance of Network Mobility Management in IPv6 Networks
Measuring the performance of an implementation of a set of protocols and analyzing the results is crucial to understanding the performance and limitations of the protocols in a rea...
Henrik Petander, Eranga Perera, Kun-Chan Lan, Arun...