Sciweavers

1566 search results - page 234 / 314
» Contification Using Dominators
Sort
View
120
Voted
ICARCV
2006
IEEE
137views Robotics» more  ICARCV 2006»
15 years 8 months ago
Nanorobot Communication Techniques: A Comprehensive Tutorial
—This work presents chemical communication techniques for nanorobots foraging in fluid environments relevant for medical applications. Unlike larger robots, viscous forces and ra...
Adriano Cavalcanti, Tad Hogg, Bijan Shirinzadeh, H...
ISPASS
2006
IEEE
15 years 8 months ago
Workload sanitation for performance evaluation
The performance of computer systems depends, among other things, on the workload. Performance evaluations are therefore often done using logs of workloads on current productions s...
Dror G. Feitelson, Dan Tsafrir
105
Voted
HICSS
2005
IEEE
165views Biometrics» more  HICSS 2005»
15 years 8 months ago
A Study of Project Management System Acceptance
This study surveyed 497 project management software users in a wide variety of project-driven organizations to examine the relationships among: computer self-efficacy, information...
Abdullah Saeed Bani Ali, William H. Money
TCC
2005
Springer
115views Cryptology» more  TCC 2005»
15 years 7 months ago
The Universal Composable Security of Quantum Key Distribution
The existing unconditional security definitions of quantum key distribution (QKD) do not apply to joint attacks over QKD and the subsequent use of the resulting key. In this paper...
Michael Ben-Or, Michal Horodecki, Debbie W. Leung,...
GECCO
2005
Springer
170views Optimization» more  GECCO 2005»
15 years 7 months ago
Multiobjective shape optimization with constraints based on estimation distribution algorithms and correlated information
A new approach based on Estimation Distribution Algorithms for constrained multiobjective shape optimization is proposed in this article. Pareto dominance and feasibility rules ar...
Sergio Ivvan Valdez Peña, Salvador Botello ...