Sciweavers

863 search results - page 97 / 173
» Computational Methods for Intelligent Information Access
Sort
View
CCS
2004
ACM
15 years 9 months ago
MAC and UML for secure software design
Security must be a first class citizen in the design of large scale, interacting, software applications, at early and all stages of the lifecycle, for accurate and precise policy ...
Thuong Doan, Steven A. Demurjian, T. C. Ting, Andr...
130
Voted
ICDCN
2010
Springer
15 years 10 months ago
Channel Assignment in Virtual Cut-through Switching Based Wireless Mesh Networks
Conventional wireless networks employ a contention based channel access mechanism, which not only imposes high latency but also reduces goodput of the network. Lack of interference...
Dola Saha, Aveek Dutta, Dirk Grunwald, Douglas C. ...
114
Voted
CEC
2008
IEEE
15 years 10 months ago
Memetic Gradient Search
—This paper reviews the different gradient-based schemes and the sources of gradient, their availability, precision and computational complexity, and explores the benefits of usi...
Boyang Li, Yew-Soon Ong, Minh Nghia Le, Chi Keong ...
122
Voted
ASSETS
2005
ACM
15 years 5 months ago
Representing coordination and non-coordination in an american sign language animation
While strings and syntax trees are used by the Natural Language Processing community to represent the structure of spoken languages, these encodings are difficult to adapt to a si...
Matt Huenerfauth
173
Voted
CEC
2007
IEEE
15 years 7 months ago
Mobile robot global localization using differential evolution and particle swarm optimization
For a mobile robot to move in a known environment and operate successfully, first it needs to robustly determine its initial position and orientation relative to the map, and then ...
Ali R. Vahdat, Naser NourAshrafoddin, Saeed Shiry ...