Sciweavers

1984 search results - page 284 / 397
» Binary Component Adaptation
Sort
View
ISCAS
2005
IEEE
142views Hardware» more  ISCAS 2005»
15 years 9 months ago
A class of novel blind source extraction algorithms based on a linear predictor
A rigorous analysis of the performance of a blind source extraction structure based on a linear predictor is provided. It is shown that by minimising the mean square prediction er...
Wei Liu, Danilo P. Mandic, Andrzej Cichocki
POPL
2005
ACM
15 years 9 months ago
Specifying Kerberos 5 cross-realm authentication
Cross-realm authentication is a useful and interesting component of Kerberos aimed at enabling secure access to services astride organizational boundaries. We present a formalizat...
Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov,...
ATAL
2005
Springer
15 years 9 months ago
An autonomous performance control framework for Distributed Multi-Agent Systems: a queueing theory based approach
Distributed Multi-Agent Systems (DMAS) such as supply chains functioning in highly dynamic environments need to achieve maximum overall utility during operation. The utility from ...
Nathan Gnanasambandam, Seokcheon Lee, Soundar R. T...
152
Voted
DALT
2004
Springer
15 years 9 months ago
Theories of Intentions in the Framework of Situation Calculus
Abstract. We propose an extension of action theories to intention theories in the framework of situation calculus. Moreover the method for implementing action theories is adapted t...
Maria del Pilar Pozos Parra, Abhaya C. Nayak, Robe...
ICCS
2004
Springer
15 years 9 months ago
An Atmospheric Sciences Workflow and Its Implementation with Web Services
: Computational and data Grids couple geographically distributed resources such as high performance computers, workstations, clusters, and scientific instruments. Grid Workflows co...
David Abramson, Jagan Kommineni, John L. McGregor,...