Sciweavers

10271 search results - page 426 / 2055
» Computer Science
Sort
View
COMPLEX
2009
Springer
15 years 11 months ago
Toward Automatic Discovery of Malware Signature for Anti-Virus Cloud Computing
Security vendors are facing a serious problem of defeating the complexity of malwares. With the popularity and the variety of zeroday malware over the Internet, generating their si...
Wei Yan, Erik Wu
ISVD
2007
IEEE
15 years 11 months ago
Variants of Jump Flooding Algorithm for Computing Discrete Voronoi Diagrams
Jump flooding algorithm (JFA) is an interesting way to utilize the graphics processing unit to efficiently compute Voronoi diagrams and distance transforms in 2D discrete space. T...
Guodong Rong, Tiow Seng Tan
FOCS
2006
IEEE
15 years 11 months ago
New Limits on Fault-Tolerant Quantum Computation
We show that quantum circuits cannot be made faulttolerant against a depolarizing noise level of ˆθ = (6 − 2 √ 2)/7 ≈ 45%, thereby improving on a previous bound of 50% (du...
Harry Buhrman, Richard Cleve, Monique Laurent, Noa...
GI
2009
Springer
15 years 9 months ago
Mobile computing in mass casualty incidents (MCIs)
: This paper illustrates the future role of mobile computing for the response in emergencies and mass casualty incidents (MCIs). Furthermore it describes the different components a...
Simon Nestler, Gudrun Klinker
ETD2000
1995
15 years 8 months ago
Automatic generation of a neural network architecture using evolutionary computation
This paper reports the application of evolutionary computation in the automatic generation of a neural network architecture.It is a usual practice to use trial and error to find a...
E. Vonk, Lakhmi C. Jain, L. P. J. Veelenturf, R. J...