Sciweavers

2503 search results - page 410 / 501
» Building Computer Network Attacks
Sort
View

Book
340views
16 years 9 months ago
Essentials of the Java Programming Language, Part 1
"If you are new to programming in the Java language, have some experience with other languages, and are familiar with things like displaying text or graphics or performing sim...
By Monica Pawlan
DAC
2006
ACM
16 years 2 months ago
Synthesis of high-performance packet processing pipelines
Packet editing is a fundamental building block of data communication systems such as switches and routers. Circuits that implement this function are critical and define the featur...
Cristian Soviani, Ilija Hadzic, Stephen A. Edwards
ICDAR
2009
IEEE
15 years 8 months ago
Text Detection and Localization in Complex Scene Images using Constrained AdaBoost Algorithm
We have proposed a complete system for text detection and localization in gray scale scene images. A boosting framework integrating feature and weak classifier selection based on...
Shehzad Muhammad Hanif, Lionel Prevost
IWANN
2009
Springer
15 years 8 months ago
Agents Jumping in the Air: Dream or Reality?
Mobile agent technology has traditionally been recognized as a very useful approach to build applications for mobile computing and wireless environments. However, only a few studie...
Oscar Urra, Sergio Ilarri, Eduardo Mena
NICSO
2010
Springer
15 years 8 months ago
Evaluation of a Catalytic Search Algorithm
We investigate the search properties of pre-evolutionary random catalytic reaction networks, where reactions might be reversible, and replication is not taken for granted. Since it...
Lidia Yamamoto