Sciweavers

5465 search results - page 1037 / 1093
» Assigning Types to Processes
Sort
View
GCC
2003
Springer
15 years 3 months ago
Constructing Secure Web Service Based on XML
The paper discusses XML security key technologies related with security of Web service. Based on these discussions, Web service is integrated with some mature security architecture...
Shaomin Zhang, Baoyi Wang, Lihua Zhou
GECCO
2003
Springer
107views Optimization» more  GECCO 2003»
15 years 3 months ago
A Possible Mechanism of Repressing Cheating Mutants in Myxobacteria
The formation of fruiting bodies by myxobacteria colonies involves altruistic suicide by many individual bacteria and is thus vulnerable to exploitation by cheating mutants. We rep...
Ying Xiao, Winfried Just
ICCS
2003
Springer
15 years 3 months ago
Method Call Acceleration in Embedded Java Virtual Machines
Object oriented languages, in particular Java, use a frequent dynamic dispatch mechanism to search for the definition of an invoked method. A method could be defined in more than...
Mourad Debbabi, M. M. Erhioui, Lamia Ketari, Nadia...
ICCS
2003
Springer
15 years 3 months ago
Self-Organizing Hybrid Neurofuzzy Networks
Abstract. We introduce a concept of self-organizing Hybrid Neurofuzzy Networks (HNFN), a hybrid modeling architecture combining neurofuzzy (NF) and polynomial neural networks(PNN)....
Sung-Kwun Oh, Su-Chong Joo, Chang-Won Jeong, Hyun-...
ISCIS
2003
Springer
15 years 3 months ago
Model-Based Human Motion Capture from Monocular Video Sequences
Generating motion and capturing motion of an articulated body for computer animation is an expensive and time-consuming task. Conventionally, animators manually generate intermedia...
Jihun Park, Sangho Park, Jake K. Aggarwal
« Prev « First page 1037 / 1093 Last » Next »