Sciweavers

2483 search results - page 336 / 497
» A design framework to model retinas
Sort
View
83
Voted
SSR
2001
104views more  SSR 2001»
14 years 11 months ago
Secure and efficient mobile agent application reuse using patterns
As wide-area open networks like the Internet and intranets grow larger, mobile agent technology is attracting more attention. Mobile agents are units of software that can deal wit...
Yasuyuki Tahara, Nobukazu Toshiba, Akihiko Ohsuga,...
ECOOP
2009
Springer
15 years 10 months ago
Making Sense of Large Heaps
Abstract. It is common for large-scale Java applications to suffer memory problems, whether inefficient designs that impede scalability, or lifetime bugs such as leaks. Making sens...
Nick Mitchell, Edith Schonberg, Gary Sevitsky
82
Voted
SP
2007
IEEE
113views Security Privacy» more  SP 2007»
15 years 4 months ago
Usable Mandatory Integrity Protection for Operating Systems
Existing mandatory access control systems for operating systems are difficult to use. We identify several principles for designing usable access control systems and introduce the...
Ninghui Li, Ziqing Mao, Hong Chen
93
Voted
GECCO
2007
Springer
268views Optimization» more  GECCO 2007»
15 years 4 months ago
Synthesis of analog filters on an evolvable hardware platform using a genetic algorithm
This work presents a novel approach to filter synthesis on a field programmable analog array (FPAA) architecture using a genetic algorithm (GA). First, a Matlab model of the FPA...
Joachim Becker, Stanis Trendelenburg, Fabian Henri...
107
Voted
WWIC
2004
Springer
197views Communications» more  WWIC 2004»
15 years 3 months ago
Context-Aware Group Communication in Mobile Ad-Hoc Networks
Abstract. The widespread availability of both fixed and wireless network connectivity and the growing market of portable devices are enabling anytime and anywhere impromptu collabo...
Dario Bottazzi, Antonio Corradi, Rebecca Montanari