Sciweavers

1791 search results - page 260 / 359
» Behavioral Operations
Sort
View
AINA
2007
IEEE
15 years 7 months ago
pKASSO: Towards Seamless Authentication Providing Non-Repudiation on Resource-Constrained Devices
PKI is generally considered as the most appropriate solution for e-commerce and mutual authentication, owing to its digital signature and non-repudiation features. Asymmetric key ...
Ki-Woong Park, Hyunchul Seok, Kyu Ho Park
ICANNGA
2009
Springer
163views Algorithms» more  ICANNGA 2009»
15 years 7 months ago
Elitistic Evolution: An Efficient Heuristic for Global Optimization
A new evolutionary algorithm, Elitistic Evolution (termed EEv), is proposed in this paper. EEv is an evolutionary method for numerical optimization with adaptive behavior. EEv uses...
Francisco Viveros Jiménez, Efrén Mez...
CGI
2004
IEEE
15 years 7 months ago
From Continuous to Discrete Games
Computer games follow a scheme of continuous simulation, coupling the rendering phase and the simulation phase. That way of operation has disadvantages that can be avoided using a...
Inmaculada García, Ramón Mollá...
ATVA
2006
Springer
158views Hardware» more  ATVA 2006»
15 years 7 months ago
Model-Based Tool-Chain Infrastructure for Automated Analysis of Embedded Systems
In many safety-critical applications of embedded systems, the system dynamics exhibits hybrid behaviors. To enable automatic analysis of these embedded systems, many analysis tools...
Hang Su, Graham Hemingway, Kai Chen, T. John Koo
AUSAI
2006
Springer
15 years 7 months ago
Automatic Generation of Funny Cartoons Diary for Everyday Mobile Life
Abstract. The notable developments in pervasive and wireless technology enable us to collect enormous sensor data from each individual. With contextaware technologies, these data c...
Injee Song, Myung-Chul Jung, Sung-Bae Cho