Sciweavers

14774 search results - page 2932 / 2955
» Computational complexity and evolutionary computation
Sort
View
CN
1999
106views more  CN 1999»
15 years 3 months ago
UIML: An Appliance-Independent XML User Interface Language
Today's Internet appliances feature user interface technologies almost unknown a few years ago: touch screens, styli, handwriting and voice recognition, speech synthesis, tin...
Marc Abrams, Constantinos Phanouriou, Alan L. Bato...
169
Voted
CN
1999
128views more  CN 1999»
15 years 3 months ago
Intrusion detection systems as evidence
: Although the main aim of IDSs is to detect intrusions to prompt evasive measures, a further aim can be to supply evidence in criminal and civil legal proceedings. However the fea...
Peter Sommer
130
Voted
JCC
2002
127views more  JCC 2002»
15 years 3 months ago
Effective Born radii in the generalized Born approximation: The importance of being perfect
: Generalized Born (GB) models provide, for many applications, an accurate and computationally facile estimate of the electrostatic contribution to aqueous solvation. The GB models...
Alexey Onufriev, David A. Case, Donald Bashford
146
Voted
JEI
1998
94views more  JEI 1998»
15 years 3 months ago
Proximity sensing with wavelet-generated video
In this paper we introduce wavelet video processing of proximity sensor signals. Proximity sensing is required for a wide range of military and commercial applications, including w...
Steven Noel, Harold Szu
136
Voted
MST
2002
107views more  MST 2002»
15 years 3 months ago
A Comparison of Asymptotically Scalable Superscalar Processors
The poor scalability of existing superscalar processors has been of great concern to the computer engineering community. In particular, the critical-path lengths of many components...
Bradley C. Kuszmaul, Dana S. Henry, Gabriel H. Loh
« Prev « First page 2932 / 2955 Last » Next »